Skip to content
Friday, June 20, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

cyber crime

how to prevent hacking in linux
Ethical Hacking IT Security 

What is Cybercrime? Cybercrime Types, Tools, and Examples

September 7, 2021September 7, 2021 eduguru 0 Comments cyber crime, cybercrime, example to cybercrime, HACKING, Linux, security, tools of cybercrime, what is cybercrime

Here, We will understand cybercrime, cybercrimes types, cybercrime types, cybercrime tool, and a few examples. Let’s start with What is

Read more
IT Security 

KINDS OF CYBER CRIME

July 29, 2020 Krishna crimes, cyber, cyber crime, cyber crimes, cyber security, KINDS OF CYBER CRIME, security

Cyber Stalking It is an act of stalking, harassing or threatening someone using Internet/computer as a medium. This is often

Read more
IT Security 

FIREWALL (CYBER SECURITY TECHNIQUE)

July 29, 2020 Krishna cyber, cyber crime, cyber security, cyber security technique, FIREWALL, FIREWALL (CYBER SECURITY TECHNIQUE), system firewall

It is a hardware/software which acts as a shield between an organization‟s network and the internet and protects it from

Read more
IT Security 

ANTIVIRUS(CYBER SECURITY TECHNIQUE)

July 29, 2020 Krishna ANTIVIRUS(CYBER SECURITY TECHNIQUE), cyber, cyber crime, cyber rules, cyber security, cyber security technique

There are verities of malicious programs like virus, worms, trojan horse, etc that are spread over internet to compromise the

Read more
IT Security 

DIGITAL SIGNATURES(CYBER SECURITY TECHNIQUE)

July 29, 2020 Krishna cyber, cyber crime, cyber security, cyber security technique, digital signature, DIGITAL SIGNATURES(CYBER SECURITY TECHNIQUE)

It is a technique for validation of data. Validation is a process of certifying the content of a document. The

Read more
IT Security 

ENCRYPTION(CYBER SECURITY TECHNIQUE)

July 29, 2020 Krishna cyber acts, cyber attacks, cyber bully, cyber commision, cyber crime, cyber rules, cyber security, ENCRYPTION(CYBER SECURITY TECHNIQUE)

It is a technique to convert the data in unreadable form before transmitting it over the internet. Only the person

Read more
IT Security 

AUTHENTICATION(CYBER SECURITY TECHNIQUE)

July 29, 2020 Krishna AUTHENTICATION(CYBER SECURITY TECHNIQUE), cyber crime, cyber crimes, cyber security, HACKERS, HACKING

It is a process of identifying an individual and ensuring that the individual is the same who he/she claims to

Read more
IT Security 

Classification of Cyber Crimes

July 29, 2020 Krishna Classification of Cyber Crimes, cyber attacks, cyber crime, cyber hackers, cyber net, cyber security, cyber space, cynet, HACKERS

he cyber criminal could be internal or external to the organization facing the cyber attack. Based on this fact, the

Read more
IT Security 

INTRODUCTION TO CYBER CRIME

July 29, 2020 Krishna cyber crime, cyber criminal, cyber security, cyber space, HACKERS, INTRODUCTION TO CYBER CRIME, security

The internet was born around 1960‟s where its access was limited to few scientist, researchers and the defence only.Internet user

Read more
Ethical Hacking IT Security Mobile 

MOBILE FORENSIC ANALYSIS

January 20, 2020 Krishna ANALYSIS, cyber crime, CYBER FORENSICS, ELECTRONIC ACCESS, FLASH MEMORY, MOBILE FORENSIC ANALYSIS, MOBILE PHONE, MS DATA, SIM, sms

HOW TO IDENTIFY A SUBSCRIBER? Every mobile subscriber is issued with a smart card called a Subscriber Identity Module (SIM).

Read more
  • ← Previous

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.