Facebook App Development with OAuth 2.0

What is OAuth (Open Authorization), and how it works? OAuth allows notifying a resource provider (e.g. Facebook) that the resource owner (e.g. you) grants permission to a third-party (e.g. a Facebook Application) access to their information (e.g. the list of your friends). You can use OAuth to get a token via a callback url and … Continue reading Facebook App Development with OAuth 2.0

Introduction to forensics & Lab 01

Computer Forensics Definitions "A methodical series of techniques and procedures for gathering evidence,from computing equipment and various storage devices and digital media,that can be presented in a court of law a coherent and meaningful format "                                       … Continue reading Introduction to forensics & Lab 01

Introduction to penetration Testing

What is penetration testing? Penetration testing ,often called “pentesting”,”pen testing”,is the practice of attacking your or your client's IT Systems and infrastructure in the same way hacker would identify the security holes but without actually  harming the System. The person carrying out pentartion test is called a penetration tester or pentester. IMPORTANT: Penetration require to … Continue reading Introduction to penetration Testing