Skip to content
Friday, July 4, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

Networking

Networking Tutorial 

Types of Networks

February 11, 2020 Krishna LAN architecture, LANEPN, PAN, POLAN, Types of Networks, vpn, WLAN

LANs (Local Area Networks) A network is any collection of independent computers that communicate with one another over a shared

Read more
Networking Tutorial 

Basic Networking

February 11, 2020 Krishna basic computer networks, Basic Networking, COMPUTER NETWORK, NETWORKING, networks

computer Network A network is any collection of independent computers that communicate with one another over a shared network medium.

Read more
Ethical Hacking IT Security Networking 

Network Penetration Testing

January 18, 2020 Krishna Network Penetration Testing, penetration test

Network penetration testing is the first penetration testing that we are going to cover in this section. Most of the

Read more
Ethical Hacking IT Security Networking 

PENETRATION TESTING VS VULNERABILITY ASSESSMENT

January 11, 2020 Krishna PENETRATION TESTING, PENETRATION TESTING VS VULNERABILITY ASSESSMENT, Vulnerability

There is often some confusion between penetration testing and vulnerability assessment. The two terms are related but penetration testing has

Read more
Ethical Hacking Networking Tutorial 

PENETRATION TESTING APPROACH

January 11, 2020 Krishna APPROACH, IP address, penetration analysis, penetration test, PENETRATION TESTING APPROACH, security

Develop a penetration test plan Establishing the test ground rules is a particularly important part of penetration analysis. The rules

Read more
Ethical Hacking IT Security Networking 

TYPES OF PENETRATION TESTS

January 11, 2020 Krishna DATA ATTACKS, INPUT ATTACK, LOGIC ATTACKS, PENETRATION, TYPES OF PENETRATION TESTS

Testing is about variation—finding the things in the software and its environment that can be varied, varying them, and seeing

Read more
Ethical Hacking IT Security Networking 

PENETRATION TESTING

January 11, 2020January 11, 2020 Krishna BENEFITS OF PENETRATION, INTERNAL PENETRATION TESTING, INTERNET, METHODOLOGY, PENETRATION TESTING, VULNERABILITY ASSESSMENT

INTRODUCTION AND METHODOLOGY Penetration testing is the process of attempting to gain access to resources without knowledge of usernames, passwords

Read more
Ethical Hacking IT Security Networking 

VULNERABILITY ASSESSMENTS

January 10, 2020 Krishna Linux, NETWORKING, networks, UNIX, Vulnerability, VULNERABILITY ASSESSMENTS

THE CHALLENGES OF VULNERABILITY ASSESSMENTS Network vulnerability assessments are widely recognized as a crucial component of network security and a

Read more
Ethical Hacking IT Security Networking 

NETWORK INTRUSION

January 10, 2020 Krishna ATTACKES, COMPUTER NETWORK, NETWORK INTRUSION, NON-TECHNICAL INTRUSION, TECHNICAL INTRUSION

Computer networks that are currently connected to the Internet are vulnerable to a variety of exploits that can compromise their

Read more
IT Security Mobile Networking Tutorial 

MOBILE SAFEGUARDS AND SOLUTIONS

January 8, 2020 Krishna

There are some solutions to secure our different types of mobile phones. Since new technologies are coming up we also

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.