Tuesday, 27 October 2020

ধর্ষণ

 

al©Y mgv‡R fqvenZvi iƒc wb‡q‡Q|

1.al©Y wK? al©‡Yi ms½v?

2.Avgv‡`i mgvR e¨e¯’vi mv‡_ al©Y †Kb evo‡Q?

3.al©K †K ev Kviv?

4.wePvi e¨e¯’v|

5. †mvk¨vj wgwWqvi Ace¨envi|

6. ag

7. wgwWqv‡Z dª‡qWxq wjwe‡Wv KvjPvi|

8. ‡cvkvK wK `vqx|

9. wKfv‡e cÖwZKvi Kiv hvq|

10. mvims‡ÿc

Monday, 6 April 2015

Top 10 Free Hacking Tutorials

Tuesday, September 24, 2013 Does hacking excite you? If yes, then we bring to you some interesting hacking tutorials. These may not be for those wanting to understand only the concept but for those who want to learn hacking techniques and have gathered some knowledge so far. 
hacker



1. Hacking Tutorials for Beginners - By BreakTheSecurity.com
The tutorial contains useful posts to help beginners understand the ethics of hacking. It also provides security tips on avoiding adware, windows firewall, online shopping, spyware prevention and so on.

2. How to learn Ethical hacking - By Astalavista.com
The site provides useful information on your devices, websites and assets. The site shows whether or not you’re hack proof.

3. Backtrack Penetration Testing Tutorial
Backtrack Penetration Testing Tutorial is probably the best penetration testing distribution that provides some penetration testing programs that are used in this Backtrack Penetration Testing Tutorial.

4. Introduction to Penetration Testing
The current tutorial teaches you penetration testing, different types of vulnerabilities, security research, payloads, and so on. A useful resource for beginners!

5. Information Gathering with Nmap
The first tutorial to give you a basic walkthrough of a penetration testing! It focuses on information gathering, finding live hosts on the network, port scanning and versions of software that is running on those ports.

6. Simple How To Articles By Open Web Application Security
The tutorial contains numerous how to articles such as how to encrypt a properties file, how to meet verification reporting requirements, how to modify proxied conversations, how to perform a security architecture review at Level 1, how to perform a security architecture review at Level 2 and how to specify verification requirements in contracts, and so on.

7. The Six Dumbest Ideas in Computer Security
The tutorial describes what it considers six dumbest ideas in computer security starting from default permit, Enumerating Badness, Penetrate and Patch, Hacking is Cool, Educating Users, Action is Better Than Inaction , and so on.

8. Secure Design Principles
Understanding the basic principles puts you in a better position to execute particular practices where needed in your own projects. The principle of least privilege specifies that a user or computer program must be granted the least amount of privileges required to achieve a task. The tutorial describes all these principles for the users.

9. 10 steps to secure software The tutorial features some principles for developing secure software recommended by author and security analyst. 

#1 – Hacking Tutorial: Tech Tips and Hacking Tricks

Sometimes, perfect English isn’t everything. Hacking Tutorial is an example of when the writing skill of the author doesn’t necessarily equate to the quality of his or her technical knowledge. This is actually the case over at Hacking Tutorial, where the author offers articles like “Client Side Attack Using Adobe PDF Escape EXE Social Engineering”, “Exploiting MS11_003 Internet Explorer Vulnerability”, and “Hacking Using BeeF XSS Framework”.

howtohack1

The articles are usually short, but actually offer highly technical, step-by-step instructions on how to do the task at hand, and the tricks and tweets absolutely work, unless the exploit has been patched.  It’s a small blog, but it’s a good one for the volume of technical tricks that you’ll find there.