Skip to main content


This disclaimer governs your use of our blog:

By using our blog,, or by any other means and/or gateways that allow access to this blog, you accept this disclaimer In full. If you disagree with any part of this disclaimer, do not use our blog, you are not welcome here.

Blog Material And Content:

You must not republish material from this blog (Including republication on another website), or reproduce or store material from this blog In any public or private electronic "retrieval system". Such material Includes (but not limited to), blog banner, theme, Icons, post descriptions, Images and anything that we have created and compiled that's dedicated to the representation and workings of this blog. Fair use for academic/non commercial and/or personal purposes Is accepted.

Limitations Of Liability:

Whilst we endeavor to ensure that the Information on this blog Is correct, we do not warrant Its completeness or accuracy; nor do we not commit to ensuring that the blog remains available at all times. Whilst we at do our utmost best to provide recent and working content, we cannot guarantee that the material on this blog Is kept up-to-date.

To the maximum extent permitted by applicable law we exclude all representations, warranties and conditions (including, without limitation, the conditions implied by law of satisfactory quality, fitness for purpose and the use of reasonable care and skill).

Our liability Is limited and excluded to the maximum extent permitted under applicable law. We will not be liable for any direct, Indirect or consequential loss or damage arising under this disclaimer or In connection with our blog, whether arising In tort, contract, or otherwise - Including, without limitation, any loss of profit, contracts, business, goodwill, data, Income, revenue or anticipated savings.

Your Responsibility And Use:

You must not use our blog In any way that causes, or may cause, damage to the blog or Impairment of the availability or accessibility of the blog. You must not use our blog In any way which Is unlawful, Illegal, fraudulent or harmful, or In connection with any unlawful, Illegal, fraudulent or harmful purpose or activity.

You must not use our blog for any purposes related to marketing without our express written consent. You must not use our blog to copy, publish or send mass mailings or spam. You must not use our blog to copy, publish or send material which Is Illegal or unlawful, or material which could give rise to legal action under English and other applicable law.

All material you copy, publish or send via our blog must not be defamatory, obscene, Indecent, hateful, discriminatory or Inflammatory. Such material must not Infringe any person's Intellectual property rights or rights of confidence, Impinge upon any person's privacy, or constitute Incitement to commit a crime. Further, material must not be misleading, deceptive, pornographic, threatening, abusive, harassing or menacing.

Subject To Change:

In unforeseen circumstances, or at the discretion of this blog and/or In the best Interests of person or persons and/or direct or Indirect entities, this disclaimer may be revised, amended or otherwise from time-to-time. Please check this page regularly to ensure you are familiar with the current version.

Agreement With This Blog:

This disclaimer constitutes the entire agreement between you and us In relation to your use of our blog, and supersedes all previous agreements In respect of your use of this blog. If you do not agree with all or any portion of this disclaimer In any way, shape, matter or form, you are not permitted to use this blog In Its entirety.


Popular posts from this blog

Web Hacking 101

With a Foreword written by HackerOne Co-Founders Michiel Prins and Jobert Abma, Web Hacking 101 is about the ethical exploration of software for security issues but learning to hack isn't always easy. With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different. Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties.

Hack-X-Crypt (By Ujjwal Sahay)

This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer hardware and software to carry out a goal outside of the creator‘s original intention. People who slot in computer hacking actions and activities are often entitled as hackers. The majority of people assume that hackers are computer criminals. They fall short to identify the fact that criminals and hackers are two entirely unrelated things.

High Performance Cloud Auditing

This eBook mainly focuses on cloud security and high performance computing for cloud auditing. The eBook discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments.