Skip to content
Thursday, June 19, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

HACKERS

Ethical Hacking IT Security 

Exploring Defensive Strategies

September 28, 2020 Krishna cyber security, Defensive, Exploring Defensive Strategies, HACKERS, HACKING, security, Strategies

Session hijacking relies, in part, on many of the prerequisites needed to successfully sniff a network. For instance, session hijacking

Read more
Ethical Hacking IT Security 

Network Session Hijacking

September 28, 2020 Krishna HACKERS, HACKING, Hijacking, Network Hijacking, network security, Network Session Hijacking

Network-level session hijacking is a hijacking method that focuses on exploiting a TCP/IP connection after initialization or authentication has occurred.

Read more
Ethical Hacking IT Security 

Session Hijacking and Web Apps

September 28, 2020 Krishna HACKERS, HACKING, security, Session Hijacking, Session Hijacking and Web Apps, Web Apps

Session hijacking at the application level focuses on gaining access to a host by obtaining legitimate session IDs from the

Read more
Ethical Hacking IT Security 

Active and Passive Attacks

September 28, 2020 Krishna Active and Passive Attacks, Active Attacks, Attacks, cyber attacks, HACKERS, Passive Attacks, security

You can categorize a session hijacking attack as either an active attack or a passive attack. Let’s look at both.

Read more
Ethical Hacking IT Security 

Types of DoS Attacks

September 27, 2020 Krishna Attacks, DoS attacks, HACKERS, HACKING, security, Types of DoS Attacks

DoS attacks come in many flavors, each of which is critical to your understanding of the nature of the DoS

Read more
Ethical Hacking IT Security 

What Is Social Networking?

September 27, 2020 Krishna HACKERS, HACKING, security, Social networking, What Is Social Networking?

Over the last decade, some of the biggest security threats have come from the use of social networking. The rapid

Read more
Ethical Hacking IT Security 

Common Targets of Social Engineering

September 26, 2020 Krishna Common Target, Common Targets of Social Engineering, HACKERS, security, social engineering Attacks

An attacker will look for targets of opportunity or potential victims who have the most to offer. Some common targets

Read more
Ethical Hacking IT Security 

Sniffing Tools

September 26, 2020 Krishna HACKERS, HACKING, security, Sniffing Tools, tools

Sniffing tools are extremely common applications. A few interesting ones are: Wireshark One of the most widely known and used

Read more
Ethical Hacking IT Security 

Overt and Covert Channels

September 25, 2020 Krishna Channels, HACKERS, HACKING, Overt and Covert Channels, security

When you are working with Trojans and other malware, you need to be aware of covert and overt channels. As

Read more
Ethical Hacking IT Security 

Tools for Creating Trojans

September 25, 2020 Krishna Creating Trojans, HACKERS, HACKING, security, Tools for Creating Trojans, Trojans

A wide range of tools exist that are used to take control of a victim’s system and leave behind a

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.