Skip to content
Sunday, July 6, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

IT Security

IT Security

Ethical Hacking IT Security 

What Is Social Networking?

September 27, 2020 Krishna HACKERS, HACKING, security, Social networking, What Is Social Networking?

Over the last decade, some of the biggest security threats have come from the use of social networking. The rapid

Read more
Ethical Hacking IT Security 

Common Targets of Social Engineering

September 26, 2020 Krishna Common Target, Common Targets of Social Engineering, HACKERS, security, social engineering Attacks

An attacker will look for targets of opportunity or potential victims who have the most to offer. Some common targets

Read more
Ethical Hacking IT Security 

What Is the Impact of Social Engineering?

September 26, 2020 Krishna social engineering, social engineering Attacks, What Is the Impact of Social Engineering?

Social engineering can have many potential outcomes on an organization, some obvious and some less so. It is important that

Read more
Ethical Hacking IT Security 

Social-engineering Phases

September 26, 2020 Krishna security attacks, social engineering, Social-engineering Phases

Social engineering, like the other attacks we have explored in this book, consists of multiple phases, each designed to move

Read more
Ethical Hacking IT Security 

Why is Social Engineering Successful?

September 26, 2020 Krishna security attacks, social engineering, Why is Social Engineering Successful?

Why has social engineering been successful, and why will it continue to be so? To answer this, you must first

Read more
Ethical Hacking IT Security 

What Is Social Engineering?

September 26, 2020 Krishna security, social engineering, What Is Social Engineering?

Social engineering is a term that is widely used but poorly understood. It’s generally defined as any type of attack

Read more
Ethical Hacking IT Security 

Sniffing Tools

September 26, 2020 Krishna HACKERS, HACKING, security, Sniffing Tools, tools

Sniffing tools are extremely common applications. A few interesting ones are: Wireshark One of the most widely known and used

Read more
Ethical Hacking IT Security 

Overt and Covert Channels

September 25, 2020 Krishna Channels, HACKERS, HACKING, Overt and Covert Channels, security

When you are working with Trojans and other malware, you need to be aware of covert and overt channels. As

Read more
Ethical Hacking IT Security 

Tools for Creating Trojans

September 25, 2020 Krishna Creating Trojans, HACKERS, HACKING, security, Tools for Creating Trojans, Trojans

A wide range of tools exist that are used to take control of a victim’s system and leave behind a

Read more
Ethical Hacking IT Security 

Detecting Trojans and Viruses

September 25, 2020 Krishna Detecting Trojans and Viruses, HACKERS, HACKING, Malware, security, Trojans, viruses

A Trojan can be detected in many ways. Port scanning, which can prove very effective if you know what to

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.