Skip to content
Saturday, May 10, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

attackers

Ethical Hacking IT Security 

Using the Ethical Hacking Process

June 25, 2020 Krishna attackers, HACKERS, Hacking Security, security, The specific deliverables, Using the Ethical Hacking Process, Vulnerability

Like    practically    any    IT    or    security    project,    you    need    to    plan    your    security    testing.    It’s been    said    that action    without  

Read more
Ethical Hacking 

Understanding the Need to Hack Your Own Systems

June 24, 2020 Krishna attackers, Black hat hackers, HACKERS, IT- Security, security, Understanding the Need to Hack Your Own Systems

To    catch    a    thief,    you    must    think    like    a    thief.    That’s    the    basis    for    ethical    hacking. Knowing    you enemy    is  

Read more
Ethical Hacking IT Security 

Recognizing How Malicious Attackers Beget Ethical Hackers

June 24, 2020 Krishna attackers, Black hat hakers, Ethical hackers, HACKERS, HACKING, IT- Security, Recognizing How Malicious Attackers Beget Ethical Hackers, security

You    need    protection    from    hacker    shenanigans;    you    have    to    become    as    savvy    as    the guys    trying    to attack    your    systems.  

Read more
Ethical Hacking 

Defining malicious user

June 24, 2020 Krishna attackers, Black hat hackers, Defining malicious user, HACKERS, HACKING, security

Malicious    user    —    meaning    a    rogue    employee,    contractor,    intern,    or    other    user    who abuses    his    or    her trusted    privileges    —  

Read more
IT Security 

Where Do Attackers Have Most of Their Fun?

June 21, 2020 Krishna attackers, Black hat hackers, HACKERS, Linux, ubuntu, Where Do Attackers Have Most of Their Fun?

Hacking into a system and environment is almost always carried out by exploiting vulnerabilities in software. Only recently has the

Read more
Tutorial Website 

Handling Attackers

April 14, 2020 Krishna Alerting Administrators, attackers, Core Defense Mechanisms, Handling Errors, IP address, Maintaining Audit Logs, scripted attack, security-critical applications

Anyone designing an application for which security is remotely important must work on the assumption that it will be directly

Read more

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.