Skip to content
Friday, June 20, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

HACKERS

Ethical Hacking IT Security 

What Is Reverse Engineering?

June 21, 2020 Krishna Black hat hackers, Ethical hackers, HACKERS, IT- Security, security, What Is Reverse Engineering?

Reverse engineering is the process of extracting the knowledge or design blue-prints from anything man-made. The concept has been around

Read more
Ethical Hacking IT Security 

Execution of a Penetration Test

June 21, 2020 Krishna Access During the Penetration Test, Execution of a Penetration Test, External and Internal Coordination, HACKERS, IT- Security, Kickoff Meeting, Managing Expectations, Managing Problems, penetration test, security, Steady Is Fast

Kickoff Meeting Unless a black box test is called for, it is important to schedule and attend a kickoff meeting,

Read more
Ethical Hacking IT Security 

Structuring a Penetration Testing Agreement

June 20, 2020 Krishna HACKERS, Linux, penetration test, security, Structuring a Penetration Testing Agreement, ubuntu

When performing penetration tests, the signed agreements you have in place may be your best friend or worst enemy. The

Read more
Ethical Hacking IT Security 

Organization of the Penetration Testing Team

June 20, 2020 Krishna HACKERS, Linux, Organization of the Penetration Testing Team, penetration test, security, ubuntu

The organization of the penetration testing team varies from job to job, but the following key positions should be filled

Read more
Ethical Hacking IT Security 

Defending Against Insider Attacks

June 19, 2020 Krishna Black hat hackers, defending, Defending Against Insider Attacks, gray hat hackers, HACKERS, Insider Attacks, IT- Security, security

In order for a company to defend itself against an insider attack, it must first give up the notion that

Read more
Ethical Hacking IT Security 

Defending Against Physical Penetrations

June 19, 2020 Krishna Attacks, defending, Defending Against Physical Penetrations, HACKERS, Penetrations test

You might assume that protecting a company’s informational assets from a physical intrusion is covered under its existing security measures,

Read more
Ethical Hacking IT Security 

Defending Against Social Engineering Attacks

June 19, 2020 Krishna BLACK HAT HACKER, Defending Against Social Engineering Attacks, ethical hacker, gray hat hacker, HACKERS, security, Social Attacks, social engineering

Hardening your environment to withstand SEAs, especially targeted ones, is more a matter of training than a traditional security control.

Read more
Ethical Hacking IT Security 

Preparing Yourself for Face-to-Face Attacks

June 19, 2020 Krishna Attacks, Face to Face Attacks, HACKERS, IT- Security, Preparing Yourself for Face-to-Face Attacks, security

It’s one thing to send an e-mail to or chat with someone online during a SEA, but it’s quite another

Read more
Ethical Hacking IT Security 

Conducting a Social Engineering Attack

June 18, 2020 Krishna Conducting a Social Engineering Attack, HACKERS, HACKING ATTACKS, security, Social Engineering Attack

It is important to discuss with your client your intention to conduct social engineering attacks, whether internal or external, before

Read more
Ethical Hacking linux Tutorial 

Famous Hackers

January 18, 2020 Krishna famous hackers, HACKERS

Jonathan James Jonathan James was an American hacker. He is the first Juvenile who send to prison for cybercrime in

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.