Published 6:02 PM by

6 free tools to find network vulnerabilities

For a average person to find the vulnerabilities by own self can be challenging though they can follow some basic security measures.
In IT security, vulnerability scanners plays a important role to modify the networks and others things to keep  it safe far from the reach of attackers more clearly, Hackers. These scanners can find the major vulnerabilities from where the hackers can enter inside the network or websites. These tools can really save your money to remove simple vulnerabilities.
You may pay for the other vulnerabilities to find as all the vulnerabilities may not be detected by the scanners to make your networks and websites more safer.



These are some of the vulnerabilities scanner that you can just try them:

  1. OpenVAS:The Open Vulnerability Assessment System (OpenVAS) is a free network security scanner platform, with most components licensed under the GNU General Public License (GNU GPL). The main component is available via several Linux packages or as a downloadable Virtual Appliance for testing/evaluation purposes. Though the scanner itself doesn’t work on Windows machines, they offer clients for Windows.
    The main component of the OpenVAS is the security scanner, which only can run in Linux. It does the actual work of scanning and receives a feed updated daily of Network Vulnerability Tests (NVT), more than 33,000 in total.
    The OpenVAS Manager controls the scanner and provides the intelligence. The OpenVAS Administrator provides a command-line interface and can act as full service daemon, providing user management and feed management.
    There are a couple clients to serve as the GUI or CLI. The Greenbone Security Assistant (GSA) offers a web-based GUI. The Greenbone Security Desktop (GSD) is a Qt-based desktop client that runs on various OSs, including Linux and Windows. And the OpenVAS CLI offers a command-line interface.
  2.  Retina CS Commmunity:Retina CS Community provides vulnerability scanning and patching for Microsoft and common third-party applications, such as Adobe and Firefox, for up to 256 IPs free. Plus it supports vulnerabilities within mobile devices, web applications, virtualized applications, servers, and private clouds. It looks for network vulnerabilities, configuration issues, and missing patches.
    The Retina CS Community software essentially provides just the patching functionality. Retina Network Community is the software that provides the vulnerability scanning, which must be separately installed before the Retina CS Community software.
    Retina CS Community installs on Windows Server 2008 or later, requires the .Net Framework 3.5 to be installed, IIS server enabled, and Microsoft SQL 2008 or later to be installed. Keep in mind, installation on Domain Controllers or Small Business Servers is not supported.
    Once the software is installed you’re provided with a GUI program for Retina Network Community component and a web-based GUI for the Retina CS Community component. It supports different user profiles so you can align the assessment to your job function.
    To scan you can choose from a variety of scan and report templates and specify IP range to scan or use the smart selection function. You can provide any necessary credentials for scanned assets that require them and choose how you want the report delivered, including email delivery or alerts.
    Retina CS Community is a great free offering by a commercial vendor, providing scanning and patching for up to 256 IPs free and supporting a variety of assets. However, some small businesses may find the system requirements too stringent, as it requires a Windows Server.
Read More
Published 8:25 PM by

How to block particular websites in WIndows?

You may sometime wish your computer not to load some websites for avoiding other people to use that website. Or to stop your children from visiting some particular sites. Yes, that can be done. It's pretty much easy to do without any software. It can be done with just few steps in Windows.

Just follow the steps below:


  • Double-click hosts, and select Notepad when Windows prompts you to choose a program. If you don't get the prompt, or if the hosts file opens in another program, open Notepad (Start, All Programs, Accessories, Notepad), and then navigate to hosts by clicking File, Open within Notepad.     

    • Open Windows Explorer and navigate to C:\Windows\System32\drivers\etc. If Windows is not installed on C:, substitute the appropriate drive letter. 
    •  Place the cursor at the end of the last line, which will say something such as '127.0.0.1 localhost' or '::1 localhost'. Press Enter to create a new line.
    Read More
    Published 8:31 PM by

    All New Wallpapers.

    These are the collection of new wallpapers for your computer.
    Right click on the image and click "Save image as" to download it.

    Read More
    Published 11:13 PM by

    White Hat Hackers are shield for our system and information.

    A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hacker use their skills to improve security by exposing vulnerabilities before malicious hacker (known as black hat hacker) can detect and exploit them.
    Read More