Skip to content
Tuesday, July 8, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

Uncategorized

Uncategorized 

Stress Testing Metrics

January 20, 2021 Krishna Metrics, Software, software testing, stress testing, Stress Testing Metrics, testing, testing tools, testing types

Metrics are basically key performance indicators. Most commonly used metrics are mentioned below: 1. Average transaction response time It is

Read more
Uncategorized 

Performance testing in software testing

January 20, 2021 Krishna Performance testing, Performance testing in software testing, software testing, testing, testing tools, testing types

It is  a type of non-functional testing. Performance testing is testing that is performed, to determine how fast some aspect

Read more
Uncategorized 

Importance of Review Process

December 31, 2020 Krishna Importance of Review Process, review, Review Process, software testing, testing

Productivity of Dev team is improved and timescales reduced because the correction of defects in early stages and work-products will

Read more
Uncategorized 

UK government launches information warfare network

November 29, 2020 Krishna DEFENCE, ENGINEERING AND TECHNOLOGY IN SOCIETY, FAKE NEWS, INFORMATION AND COMMUNICATIONS, INTERNET, UK, UK government launches information warfare network

The UK Government has launched a new approach, through a network of technical experts, to find ways to conduct information

Read more
Uncategorized 

INTRODUCTION TO PENETRATION TESTING

November 23, 2020 Krishna

NTRODUCTIONThis article provides a general introduction to the subject of penetrationtesting and provides the security professional with the background need-ed

Read more
Uncategorized 

WHAT IS WIRELESS LAN?

July 31, 2020 Krishna cyber, cyber attacks, security, WHAT IS WIRELESS LAN?, wireless, wireless lan security. cyber security

The Wireless LAN or WLAN is becoming a popular way to connect devices such as computers these days. In offices

Read more
Uncategorized 

Assessing Vulnerabilities

June 25, 2020 Krishna Assessing Vulnerabilities, Black hat hackers, Computer Security, ETHICAL HACKING, HACKERS, HACKING, security, system security IT-security

After    finding    potential    security    holes,    the    next    step    is    to    confirm    whether    they’re indeed    vulnerabilities    in    the    context    of    your  

Read more
Uncategorized 

Securing Session Management

May 5, 2020 Krishna Attacking Session Management, ETHICAL HACKING, Generate Strong Tokens, HACKING, Per-Page Tokens, Protect Tokens throughout Their Lifecycle, Securing Session Management, web-app, web-site, wep-app-hacking

The defensive measures that web applications must take to prevent attacks on their session management mechanisms correspond to the two

Read more
Uncategorized 

Vulnerable Mapping of Tokens to Sessions

May 5, 2020 Krishna Attacking Session Management, Client Exposure to Token Hijacking, ETHICAL HACKING, Vulnerable Mapping of Tokens to Sessions, Vulnerable Session Termination, web-hack, website hacking

Various common vulnerabilities in session management mechanisms arise because of weaknesses in the way the application maps the creation and

Read more
Uncategorized 

Types of programming languages

February 29, 2020 Krishna and Visual Basic, assembler, Assembly Language, basic, C#, COBOL, FORTRAN, High Level Language, Input/output operations, Java, Low Level Language, Machine language, Pascal, Perl, PHP, Programming languages, python, Ruby, Types of programming languages

Programming languages A programming language is a means of communication for the user to communicate with the computer system. The

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.