Skip to content
Thursday, June 19, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

HACKERS

Ethical Hacking IT Security 

Hacking Methodologies

September 17, 2020 Krishna Black hat hackers, HACKERS, HACKING, Hacking Methodologies, Methodologies, white hat hackers

A hacking methodology refers to the step-by-step approach used by an aggressor to attack a target such as a computer

Read more
Ethical Hacking IT Security 

As an ethical hacker you must agree to the some code of ethics

September 16, 2020 Krishna As an ethical hacker you must agree to the some code of ethics, ethical, Ethical hackers, HACKERS, hacking some hackers code, white hat hackers

Keep private and confidential information gained in your professional work (in particular as it pertains to client lists and client

Read more
Ethical Hacking IT Security 

Ethical Hacking and Penetration Testing

September 16, 2020 Krishna ETHICAL HACKING, Ethical Hacking and Penetration Testing, hacker, HACKERS, HACKING, PENETRATION TESTING

Ethical hackers engage in sanctioned hacking—that is, hacking with permission from the system’s owner. In the world of ethical hacking,

Read more
how to prevent hacking in linux
Ethical Hacking IT Security 

Bad Guys and Good Guys or Hackers and Ethical Hackers

September 16, 2020September 8, 2021 Krishna Bad Guys and Good Guys or Hackers and Ethical Hackers, bad hackers, Black hat hackers, good hackers, HACKERS, HACKING, white hat hackers

The difference between an ethical hacker and a hacker is something that can easily get you into an argument. Just

Read more
Ethical Hacking IT Security 

The Evolution and Growth of Hacking

September 16, 2020 Krishna evolution of hacking, growth of hacking, HACKERS, hackers worlds, HACKING, The Evolution and Growth of Hacking

Attackers have constantly sought to “up” their game with new tactics and strategies to include new types of malware such

Read more
IT Security 

Hacking: Fun or Criminal Activity?

September 16, 2020 Krishna Criminal activity, fun activity, HACKERS, HACKING, hacking fun, Hacking: Fun or Criminal Activity?

Hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. It

Read more
Ethical Hacking IT Security 

Current Developments in Hacking

September 16, 2020 Krishna Current Developments in Hacking, current situation in hacking, development in hacking, Development list, HACKERS, hackers list, HACKING, IT- Security

In the early 2000s, more malicious activity started to appear in the form of more advanced attacks. In fact, in

Read more
Ethical Hacking IT Security 

The Early Days of Hacking

September 16, 2020 Krishna Black hat hackers, CYBER ATTACKES, HACKERS, HACKING, The Early Days of Hacking, white hat hackers

As the story goes, the earliest hackers were a group of people who were passionate and curious about new technology.

Read more
NEWS 

Russian Hackers Named ‘Cozy Bear’ Are Targeting COVID-19 Vaccines

September 15, 2020 Krishna covid-19, Cozy Bear, HACKERS, HACKING, russian hacker, russian hackers, Russian Hackers Named 'Cozy Bear' Are Targeting COVID-19 Vaccines, target Covid-19

A security organization in the U.K. says a group of Russian hackers is targeting research centers involved in COVID-19 (coronavirus) vaccine development.

Read more
NEWS 

How Hackers Can Pick Your Locks Just By Listening

September 15, 2020 Krishna black hat hacking, HACKERS, hackers can pic your locks, HACKING, How Hackers Can Pick Your Locks Just By Listening, locks

When someone is watching over your shoulder, it’s second nature to cover up your keyboard before typing in a password on your

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.