Skip to content
Thursday, June 19, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

HACKERS

Ethical Hacking IT Security 

Detecting Trojans and Viruses

September 25, 2020 Krishna Detecting Trojans and Viruses, HACKERS, HACKING, Malware, security, Trojans, viruses

A Trojan can be detected in many ways. Port scanning, which can prove very effective if you know what to

Read more
Ethical Hacking IT Security 

Trojans

September 25, 2020 Krishna HACKERS, HACKING, Malware, security, Trojans, warms

One of the older and potentially widely misunderstood forms of malware is the Trojan. Simply put, a Trojan is a

Read more
Ethical Hacking IT Security 

Scareware

September 25, 2020 Krishna HACKERS, HACKING, Malware, Scareware, security

A relatively new type of software is scareware. This type of malware warns the victim of potential harm that could

Read more
Ethical Hacking IT Security 

Adware

September 25, 2020 Krishna Adware, HACKERS, HACKING, Malware, security

Adware is a well-known type of malware. Many systems are actively infected with this type of malware from the various

Read more
Ethical Hacking IT Security 

Spyware

September 25, 2020 Krishna HACKERS, security, spyware

Spyware is a type of malware that is designed to collect and forward information regarding a victim’s activities to an

Read more
Ethical Hacking IT Security 

The Functioning of Computer Worms

September 25, 2020 Krishna HACKERS, The Functioning of Computer Worms, Worms

Worms are an advanced form of malware, compared to viruses, and have different goals in many cases. One of the

Read more
Ethical Hacking IT Security 

Worms

September 25, 2020 Krishna HACKERS, security, Worms

When we speak of viruses, the topic of worms is not far behind. They are another major menace. Unlike viruses,

Read more
Ethical Hacking IT Security 

Process of developing a virus

September 25, 2020 Krishna HACKERS, Process of developing a virus, security, virus, virus development

The process of developing a virus is very methodical. The author is concerned with creating an effective virus that can

Read more
Ethical Hacking IT Security 

Viruses

September 25, 2020 Krishna HACKERS, security, viruses

A virus represents the oldest form of malware and is by far the best known to the public. But what

Read more
Ethical Hacking IT Security 

Malware and the Law

September 25, 2020 Krishna HACKERS, Law, Malware, Malware and the Law, security

Ethical hackers should be mindful of the web of laws that relates to the deployment and use of malware. Over

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.