Skip to content
Saturday, July 5, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

IT Security

IT Security

Ethical Hacking IT Security 

Active and Passive Attacks

September 28, 2020 Krishna Active and Passive Attacks, Active Attacks, Attacks, cyber attacks, HACKERS, Passive Attacks, security

You can categorize a session hijacking attack as either an active attack or a passive attack. Let’s look at both.

Read more
Ethical Hacking IT Security 

Spoofing vs. Hijacking

September 28, 2020 Krishna Hijacking, SPOOFING, Spoofing vs. Hijacking

you should know that spoofing and hijacking are two distinctly different acts. Spoofing is when an attacking party pretends to

Read more
Ethical Hacking IT Security 

Session Hijacking

September 28, 2020 Krishna HACKING, Hijacking, security, session, Session Hijacking

Session hijacking is synonymous with a stolen session, in which an attacker intercepts and takes over a legitimately established session

Read more
Ethical Hacking IT Security 

DoS Pen Testing Considerations

September 28, 2020 Krishna DoS, DoS Attack, DoS Pen Testing, DoS Pen Testing Considerations, Pen Testing

When you’re pen testing for DoS vulnerabilities, a major area of concern is taking down integral resources during the testing

Read more
Ethical Hacking IT Security 

DoS Defensive Strategies

September 28, 2020 Krishna DoS, DoS Attack, DoS Defensive Strategies

Let’s look at some DoS defensive strategies: Disabling Unnecessary Services You can help protect against DoS and DDoS attacks by

Read more
Ethical Hacking IT Security 

Types of DoS Attacks

September 27, 2020 Krishna Attacks, DoS attacks, HACKERS, HACKING, security, Types of DoS Attacks

DoS attacks come in many flavors, each of which is critical to your understanding of the nature of the DoS

Read more
Ethical Hacking IT Security 

DoS Targets

September 27, 2020 Krishna DoS, DoS attacks, DoS Targets

DoS attacks result in a multitude of consequences. Let’s look at some common examples of what is seen in the

Read more
Ethical Hacking IT Security 

Understanding DoS

September 27, 2020 Krishna Denial of Service, DoS Attack, Understanding DoS

Denial of service is an attack that aims at preventing normal communication with a resource by disabling the resource itself,

Read more
Ethical Hacking IT Security 

Countermeasures for Social Networking

September 27, 2020 Krishna Countermeasures, Countermeasures for Social Networking, Social networking

social networking has exploded in popularity so quickly, companies and individuals have not had much time to deal with the

Read more
Ethical Hacking IT Security 

Mistakes in Social Media and Social Networking

September 27, 2020 Krishna Mistakes in Social Media, Mistakes in Social Media and Social Networking, security, social media, Social networking

Social media can be made safer if you take simple steps to strengthen your accounts. In fact, it has been

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.