Skip to content
Sunday, July 6, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

IT Security

IT Security

Ethical Hacking IT Security 

Viruses

September 25, 2020 Krishna HACKERS, security, viruses

A virus represents the oldest form of malware and is by far the best known to the public. But what

Read more
Ethical Hacking IT Security 

Categories of Malware

September 25, 2020 Krishna Categories of Malware, Malware

malware is an extremely broad term that blankets a range of software packages. We can say that malware is anything

Read more
Ethical Hacking IT Security 

Malware and the Law

September 25, 2020 Krishna HACKERS, Law, Malware, Malware and the Law, security

Ethical hackers should be mindful of the web of laws that relates to the deployment and use of malware. Over

Read more
Ethical Hacking IT Security 

Malware

September 24, 2020 Krishna HACKING, Malware, security

Malware is a term that is frequently used but frequently misapplied, so let’s first clarify its meaning. The term malware

Read more
Ethical Hacking IT Security 

Executing Applications

September 24, 2020 Krishna application, Executing Applications

Once you gain access to a system and obtain sufficient privileges, it’s time to compromise the system and carry out

Read more
Ethical Hacking IT Security 

Authentication on Microsoft Platforms

September 24, 2020 Krishna Authentication, Authentication on Microsoft Platforms, Kerberos, Microsoft platforms, NTLM Authentication, Privilege Escalation, Security Accounts Manager (SAM)

Security Accounts Manager (SAM) Inside the Windows operating system is a database that stores security principals (accounts or any entity

Read more
Ethical Hacking IT Security 

SMTP Enumeration

September 22, 2020 Krishna Enumeration, SMTP, SMTP Enumeration

Gathering information from a target is through the use of SMTP. This protocol is designed to send messages between servers

Read more
Ethical Hacking IT Security 

Enumeration Using NTP

September 22, 2020 Krishna Enumeration Using NTP, ntp

Another effective way to gather information about a network and the resources on it is through use of the Network

Read more
Ethical Hacking IT Security 

LDAP and Directory Service Enumeration

September 22, 2020 Krishna ldap, LDAP and Directory Service Enumeration

The Lightweight Directory Access Protocol (LDAP) is used to interact with and organize databases. LDAP is very widely used due

Read more
Ethical Hacking IT Security 

Unix and Linux Enumeration

September 22, 2020 Krishna Enumeration, ETHICAL HACKING, Linux, security, UNIX, Unix and Linux Enumeration

Linux and Unix systems are no different from Windows systems and can be enumerated as well. The difference lies in

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.