Skip to content
Sunday, May 11, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

Footprinting

Ethical Hacking IT Security 

The Footprinting Process

September 21, 2020 Krishna Footprinting, google hacking, Location and Geography, Network Information, security, social engineering, Social Networking and Information Gathering, The Footprinting Process, Working with E-mail

There are many steps in the footprinting process, each of which will yield a different type of information. Remember to

Read more
Ethical Hacking IT Security 

Threats Introduced by Footprinting

September 21, 2020 Krishna Footprinting, threats, Threats Introduced by Footprinting

Social Engineering One of the easiest ways to gain information about a target or to get information in general is

Read more
Ethical Hacking IT Security 

Terminology in Footprinting

September 21, 2020 Krishna Footprinting, Terminology, Terminology in Footprinting

Open Source and Passive Information Gathering As far as intelligence gathering goes, open source or passive information gathering is the

Read more
Ethical Hacking IT Security 

Goals of the Footprinting Process

September 21, 2020 Krishna Footprinting, Goals of footprinting, Goals of the Footprinting Process

Before you start doing footprinting and learn the techniques, you must set some expectations as to what you are looking

Read more
Ethical Hacking IT Security 

Why Perform Footprinting?

September 21, 2020 Krishna Footprinting, perform footprinting, Why Perform Footprinting?

Footprinting is about gathering information and formulating a hacking strategy. With proper care you, as the attacking party, may be

Read more

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.