Monday , 6 February 2023
Home » English


Configuring Topology network equipment Juniper


Continue with the basic article on Juniper devices, network security today actual models configured with: – VLAN in the floor, with each VLAN routing – Configuration 2 way physical lumped into one logical to increase the bandwidth and speed, backup – Configuring Static route – DHCP Relay (Refer to the basic article here 🙂 Create VLAN, all VLAN must be …

Read More »

Using BURP to Brute Force Damn Vulnerable Web Applications

Using BURP to Brute Force Damn Vulnerable Web Applications To a knowledgeable information security professional, Damn Vulnerable Web Applications is just as it sounds.  It is a set of purposefully flawed web applications that allows a pen testers to practice his or her craft. In this demonstration, I am going to be using Burp Suite to brute force the username …

Read More »

How crack password in excel do not software

You download an Excel file on the network, but it requires a new password can be opened. This article will guide you How crack password in excel do not software quickest for Excel 2007  and Excel 2010 , 2013 offline. Microsoft Excel is a program that creates a spreadsheet application makes it easier to perform calculations of data. Excel has many utilities …

Read More »

New LED technology will make WiFi bandwidth 10 times faster


The technology could be integrated with existing WiFi systems to reduce bandwidth problems in crowded locations, such as airport terminals or coffee shops, and in homes where several people have multiple WiFi devices.Experts say that recent advances in LED technology have made it possible to modulate the LED light more rapidly, opening the possibility of using light for wireless transmission …

Read More »

Configuring Dynamic NAT

cau hinh NAT dong

Configuring  Dynamic NAT The article should refer to: Posts: Configure static routing (static route and the default route) Download file on Packet Tracer To implement: 1. ON Router Customer: Step 1: Configure the default routing Default Route to the command ip route Step 2: Configure NAT: + Definitions range of LAN IP access list by type stardard Access list 10 …

Read More »

Access control list on Switch

mohinh accesslist

Access control list on Switch When it comes to the Access Control List, or you configured on the router, ASA and other security devices.Today I would like to introduce to you the example of ACL Switch on the device, it is flexible and handy. For the following models:  3 VLAN: (1,2,3) ip and information shown above See the article here Access Control …

Read More »

Some solutions security network

lan network model

Some solutions security network  I. BACKGROUND Currently, most of the organizations, units, schools are connected to the Internet, partners and has inherited many benefits from it. But the main advantage of this rich potential dangers such as viruses, hackers, etc. tech. In recent years, many students and practitioners to submit questions “how the network design is safe, secure,” and should I …

Read More »

How to Hide Your IP Address


How to Hide Your IP Address Borrow a different IP address to go anywhere online and stay hidden. There are a few ways to hide your IP address…that unique number assigned to the network connection on the computer. Top 4 reasons why people want to hide their IP address:   Hide their geographical location Prevent Web tracking Avoid leaving a …

Read More »

WordPress 0 day Exploiter

WordPress 0day Exploiter Wordpress 0day Exploiter is a tool that enable you to register as new admin on a wordpress site which have the bug on the Ajax.php file. How to create dorks? It’s very easy so create the dorks, the list of vulnerable themes are already provided on the right richtext box. So, you just need to add the …

Read More »

SQLi-DB – SQLi Dork Scanner

SQLi-DB is a SQL Injection dork scanner. This scanner was coded in C# by RieqyNS13 from Indonesia. And it was recoded and rearrange by K3RAMA7. He make this based on the theme of the famous Defacement Mirror, HACK-DB. Features: -Multiple Search Engine -Auto-Rotate Proxy -Deep Scan -CC Checker To use this, it is very easy, simply paste your SQLi dork …

Read More »