Skip to content
Friday, June 20, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

PASSWORD

UNIX 

Unix Root Password

October 12, 2020 Krishna PASSWORD, root, Root password, UNIX, Unix password, Unix Root Password

To system administrators: use the rules. make sure every user uses a password. limit the number of people who know

Read more
IT Security 

What is a password manager?

July 31, 2020 Krishna manager, PASSWORD, password list, password manager, What is a password manager?

A password manager is software that helps a user to manage passwords and important information so that it can be

Read more
Ethical Hacking IT Security 

Cracking Phones and Tablets

July 1, 2020 Krishna computer hackers, Cracking Phones, Cracking Phones and Tablets, cracking Tablets, HACKING, IT- Security, PASSWORD, password cracker, security

I    don’t    envy    IT    administrators    and    information    security    managers    for    many    reasons    but especially    when    it    comes    to    the    bring  

Read more
linux ubuntu 

Ubuntu Commonsense Security

June 5, 2020 Krishna Installing new software, Linux, Locking up your PC, PASSWORD, security, ubuntu, Ubuntu Commonsense Security, Updating System

As you start to understand how Ubuntu works, you’ll become more and more aware of commonsense methods that will protect

Read more
Tutorial Web Hosting Website 

Defects in Multistage Login Mechanisms

April 30, 2020April 30, 2020 Krishna attacker, Attacking Authentication, Defects in Multistage Login Mechanisms, Fail-Open Login Mechanisms, HACKING, Insecure Storage of Credentials, PASSWORD, security vulnerabilities, web hacking, website

Some applications use elaborate login mechanisms involving multiple stages. For example: ■ Entry of a username and password. ■ A

Read more
Tutorial Web Hosting Website 

User Impersonation Functionality

April 30, 2020April 30, 2020 Krishna HACKING, Incomplete Validation of Credentials, PASSWORD, password validation, User Impersonation Functionality, web hacking, website

Some applications implement the facility for a privileged user of the application to impersonate other users, in order to access

Read more
Tutorial Web Hosting Website 

Remember Me” Functionality

April 30, 2020April 30, 2020 Krishna application users, Authentication, PASSWORD, Remember Me” Functionality, vulnerable, web hacking, web-attack, website

Applications often implement “remember me” functions as a convenience to users, to prevent them needing to reenter their username and

Read more
Tutorial Web Hosting Website 

Forgotten Password Functionality

April 30, 2020 Krishna account recovery function, Attacking Authentication, forgotten password, Forgotten Password Functionality, HACKING, mechanisms, PASSWORD, URL, web hacking

Like password change functionality, mechanisms for recovering from a forgotten password situation often introduce problems that may have been avoided

Read more
linux Tutorial 

SHADOW FILE

January 10, 2020 Krishna 'FILE', DESIGN, LINUX FILE, PASSWORD, SHADOW FILE, UNIX FILE

SHADOW FILE In Unix-like operating systems, /etc/shadow is used to increase the security level of passwords by restricting all but

Read more
MySQL Cluster
mysql 

Executing SQL Statements from a Text File

August 14, 2018 eduguru 0 Comments command line - How can I run an SQL script in MySQL? - Stack Overflow, database name like this, Executing SQL Statements from a Text File, Executing SQL Statements from a Text File - MySQL :: Developer Zone, How can I run an SQL script in MySQL?, MySQL, mysql query from file, PASSWORD, run a mysql query, Run SQL script files, run SQL Statements from a Text File, simply login to mysql shell and the sql file as follows:, SQL query from a Text File, with user name

Executing SQL Statements from a Text File The mysql client typically is used interactively, like this: shell> mysql db_name However,

Read more
  • ← Previous

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.