BLOG

Latest Articles

How to use AAA with Network Policy Server (Part 1)

Network Policy Server (NPS) is the Microsoft implementation of a Remote Authentication Dial-in User Service (RADIUS) server and proxy. A RADIUS server provides …

By nurten-dogan · 6 min read · Wireshark

Analyze phishing email using Thephish [100% Working]

In this tutorial we shared step by step instructions to analyze phishing email using ThePhish which uses other open source yet powerful tools (MISP, Cortex and …

By kennedymuthii · 5 min read · Ethical hacking

SQL TOP Explained [Practical Examples]

SQL TOP clause is used to limit the records returned as the result set of SQL select query by specified number of rows or percentage of rows in SQL Server.

By falgunithakker · 8 min read · SQL

4 programs that shows how Java global variables work

A Java global variable is a variable that is declared outside a method or at the start of a code is a global variable, there are no access restrictions on a …

By azkaiftikhar · 6 min read · JAVA