Skip to content
Monday, July 7, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

IT Security

IT Security

Ethical Hacking IT Security 

Enumeration with SNMP

September 22, 2020 Krishna Enumeration, Enumeration with SNMP, SNMP

Another useful mechanism for enumerating a target system is the Simple Network Manage- ment Protocol (SNMP). This protocol is used

Read more
Ethical Hacking IT Security 

Windows Basics

September 22, 2020 Krishna Groups, NULL Sessions, PsTools Suite, Security Identifiers, Services and Ports of Interest, Users, Windows, Windows Basics

The Microsoft Windows operating system is designed to be used as either a stand-alone or a networked environment; however, for

Read more
Ethical Hacking IT Security 

What Is Enumeration?

September 21, 2020 Krishna Enumeration, security, What Is Enumeration?

Enumeration is the process of extracting information from a target system in an organized and methodical manner. During enumeration you

Read more
Ethical Hacking IT Security 

Checking for Live Systems

September 21, 2020 Krishna Checking for Live Systems, checking system, ETHICAL HACKING, live system, security

How do you check for live systems in a targeted environment? There are plenty of ways to accomplish this. Some

Read more
Ethical Hacking IT Security 

What Is Network Scanning?

September 21, 2020 Krishna network scanning, scanning, What Is Network Scanning?

Networking scanning is a methodical process that involves probing a target network with the intent of finding out information about

Read more
Ethical Hacking IT Security 

The Footprinting Process

September 21, 2020 Krishna Footprinting, google hacking, Location and Geography, Network Information, security, social engineering, Social Networking and Information Gathering, The Footprinting Process, Working with E-mail

There are many steps in the footprinting process, each of which will yield a different type of information. Remember to

Read more
Ethical Hacking IT Security 

Threats Introduced by Footprinting

September 21, 2020 Krishna Footprinting, threats, Threats Introduced by Footprinting

Social Engineering One of the easiest ways to gain information about a target or to get information in general is

Read more
Ethical Hacking IT Security 

Terminology in Footprinting

September 21, 2020 Krishna Footprinting, Terminology, Terminology in Footprinting

Open Source and Passive Information Gathering As far as intelligence gathering goes, open source or passive information gathering is the

Read more
Ethical Hacking IT Security 

Goals of the Footprinting Process

September 21, 2020 Krishna Footprinting, Goals of footprinting, Goals of the Footprinting Process

Before you start doing footprinting and learn the techniques, you must set some expectations as to what you are looking

Read more
Ethical Hacking IT Security 

Why Perform Footprinting?

September 21, 2020 Krishna Footprinting, perform footprinting, Why Perform Footprinting?

Footprinting is about gathering information and formulating a hacking strategy. With proper care you, as the attacking party, may be

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.