Advanced Exploitation with Metasploit

Exploitation of Hash Functions
Cryptography provides us the way to securely share the data over an insecure channel.

  • How is this achieved?
  • What exactly does cryptographic protocols include, which sends the information?
  • What makes it secure?

The article will answer those questions describing the building blocks of the cryptographic functions.

By Deepanshu Khanna and Er Laveena Sehgal

Building a Successful Disaster Recovery Program
Today, business is dependent on the continuous availability of technology infrastructure, platforms and services. For this reason, disaster recovery planning continues to gain prominence as a critical part of risk management. This article aims to summarize how to implement a successful disaster recovery program.

by Michael Lemire

Want to subscribe?

Contact Ewa at

Please Use your work email.