Certified Information Systems Security Professional: CISSP

how to prevent hacking in linux

What is a Certified Information System Security Professional or CISSP? Certified Information Systems Security Professional (CISSP) is considered a quality standard in the field of information security. This Cyber certification is offered by (ISC)2 which is an international non-profit organization with more than 200k certified members. The certification was introduced in 1994 and is the most required … Read more

How to prevent Linux hacks

how to prevent hacking in linux

Linux is the most widely used server operating system, especially for web servers. It is open-source; this means anybody can have access to the source code. This makes it less secure compared to other operating systems as attackers can study the source code to find vulnerabilities. Linux for Hackers is about exploiting these vulnerabilities to gain unauthorized access … Read more

SQL DEFAULT Constraint : add Default Value Into a Column

The DEFAULT constraint is used to set a default value for a column. In the below example City column has the default value Sandnes CREATE TABLE Persons (    ID int NOT NULL,    LastName varchar(255) NOT NULL,    FirstName varchar(255),    Age int,    City varchar(255) DEFAULT ‘Sandnes’); The default value will be added to all new records if no other value is specified. Example of default constraint Example … Read more

SQL Injection to Web Application and prevention

What is SQL Injection? SQL Injection is an attack that poisons dynamic SQL statements to comment out certain parts of the statement or appending a condition that will always be true. It takes advantage of the design flaws in poorly designed web applications to exploit SQL statements to execute malicious SQL code. Data is one … Read more

How to Hack a Website

How to Hack a Website Here, you will learn how to hack websites, and we will introduce you to web application hacking techniques and the countermeasures you can put in place to protect against such attacks. What is a web application? What are Web Threats? A web application (aka website) is an application based on the client-server … Read more

What is VPN, and why does Home Ministry want to ban it?

What is VPN, and why does Home Ministry want to ban it? A Home Affairs Committee has urged the Indian government to ban VPN services across India for security reasons. Virtual Private Network or VPN is gaining the limelight in India, with alleged reports hinting that the government might soon ban their use in the … Read more

How to Hack a Web Server

How to Hack a Web Server Most websites store valuable information such as credit card numbers, email addresses, and passwords, etc. This has made them targets to attackers. Defaced websites can also be used to communicate religious or political ideologies etc. Here, we will introduce you to web server hacking techniques and how you can … Read more

DoS Denial of Service Attack

DoS – Denial of Service Attack What is DoS Attack? DOS is an attack used to deny legitimate users access to a resource such as accessing a website, network, emails, etc., or making it extremely slow. DoS is the acronym for Denial of Service. This type of attack is usually implemented by hitting the target resource such as … Read more

WPS Spreadsheets

WPS Spreadsheets WPS Spreadsheets belongs to WPS Office, a complete office suite for Windows, macOS, and Linux. Apart from Spreadsheets, the suite also includes WPS Presentation, WPS Writer, and a PDF editor. The main advantage of WPS Spreadsheets is its high compatibility with Excel files because it supports XLS, XLSX, and CSV. Exporting spreadsheets to PDF is available but the output file will contain a … Read more