Skip to content
Saturday, May 10, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

hacker

Ethical Hacking IT Security 

Ethical Hacking and Penetration Testing

September 16, 2020 Krishna ETHICAL HACKING, Ethical Hacking and Penetration Testing, hacker, HACKERS, HACKING, PENETRATION TESTING

Ethical hackers engage in sanctioned hacking—that is, hacking with permission from the system’s owner. In the world of ethical hacking,

Read more
Ethical Hacking 

Defining hacker

June 24, 2020 Krishna attacker, Black hat hackers, Defining hacker, hacker, security

Hacker    has    two    meanings: Traditionally,    hackers    like    to    tinker    with    software    or    electronic    systems.    Hackers enjoy    exploring    and    learning    how  

Read more
Ethical Hacking IT Security 

Recognizing the Gray Areas in Security

June 18, 2020June 18, 2020 Krishna ETHICAL HACKING, gray Area in security, gray hat hacker, hacker, HACKING, Recognizing the Gray Areas in Security, security

Since technology can be used by the good and bad guys, there is always a fine line that separates the

Read more
Ethical Hacking IT Security Tutorial 

Working With Google URLs

May 18, 2020 Krishna ETHICAL HACKING, google hacking, gooogle messages, hacker, HACKING, IT- Security, translation services, variables, Working With Google URLs

Advanced Google users begin testing advanced queries right from the Web interface’s search field, refining queries until they are just

Read more
Ethical Hacking IT Security Tutorial 

Google Basic Searching

May 18, 2020 Krishna adult humor, Carolina gets pwnt, ETHICAL HACKING, Google Basic Searching, Google hacker, google hacking, Google Search Basics, Google’s Warnings, hacker, mad hacker dpak, Using Boolean Operators and Special Characters

Google searching is a process, the goal of which is to find information about a topic.The process begins with a

Read more
Tutorial Web Hosting Website 

Bypassing Filters

May 6, 2020 Krishna Avoiding Blocked Characters, Bypassing Filters, Circumventing Simple Validation, cyber security, ethical hacker, Exploiting Defective Filters, hack, hacker, Manipulating Blocked Strings, Using Dynamic Execution, Using SQL Comments, web application, web-app, web-site, web-site-hack

In some situations, an application that is vulnerable to SQL injection may implement various input filters that prevent you from

Read more

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.