Skip to content
Tuesday, July 8, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

Linux

Ethical Hacking IT Security 

Planning a Penetration Test

June 20, 2020June 20, 2020 Krishna Black box testing, ethical hacker, Gray Box Testing, Linux, penetration test, Planning a Penetration Test, ubuntu, White box testing

Types of Penetration Tests There are basically three types of penetration testing: white box, black box, and gray box. White

Read more
Ethical Hacking IT Security 

Metasploit: The Big Picture

June 20, 2020 Krishna Linux, Metasploit, Metasploit: The Big Picture

Metasploit is a free, downloadable framework that makes it very easy to acquire, develop, and launch exploits for computer software

Read more
Ethical Hacking IT Security 

Updating BackTrack

June 20, 2020 Krishna BackTrack, IOS, Linux, Updating, Updating BackTrack

The BackTrack developers maintain a repository of the latest version of all tools contained in the distribution. You can update

Read more
Ethical Hacking IT Security linux 

BackTrack: The Big Picture

June 19, 2020 Krishna BackTrack, BackTrack: The Big Picture, IOS, Linux, Linux IOS

BackTrack is a free, well-designed penetration-testing Linux workstation built and refined by professional security engineers. It has all the tools

Read more
Ethical Hacking IT Security 

Securely Protect Yourself Against Cyber Trespass Act (SPY Act)

June 18, 2020 Krishna Hacking Act, IT- Security, Linux, Securely Protect Yourself Against Cyber Trespass Act (SPY Act), security

The Securely Protect Yourself Against Cyber Trespass (SPY Act) was passed by the House of Representatives, but never voted on

Read more
Ethical Hacking IT Security 

The Rise of Cyberlaw

June 18, 2020 Krishna Linux, The Rise of Cyberlaw

Today’s CEOs and management not only need to worry about profit margins, market analysis, and mergers and acquisitions; now they

Read more
linux ubuntu 

Installing LaTeX on Ubuntu

June 17, 2020June 17, 2020 Krishna editor, Installing LaTeX on Ubuntu, LaTeX, Linux, ubuntu

LaTeX is a markup language for describing a document. It can also be defined as a document preparation system. LaTeX

Read more
info IT Security 

The iOS Security Model

June 16, 2020 Krishna IOS, IOS Model, Linux, Security model, The iOS Security Model, ubuntu

Apple has incorporated four layers of security in iOS to protect the user and their data. Device Security Techniques to

Read more
linux ubuntu 

Using Brace Expansion

June 16, 2020 Krishna Linux, ubuntu, Using Brace Expansion

The ultimate labor-saving trick at the command-line is brace expansion. Put simply, anything within braces ({}) is substituted within the

Read more
linux ubuntu 

Shortcuts for System Control

June 15, 2020 Krishna Linux, Shortcuts for System Control, ubuntu

In terms of the control over your system offered by keyboard commands, pressing Ctrl+Z has the effect of stopping the

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.