Skip to content
Saturday, May 10, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

security attacks

Ethical Hacking IT Security 

Social-engineering Phases

September 26, 2020 Krishna security attacks, social engineering, Social-engineering Phases

Social engineering, like the other attacks we have explored in this book, consists of multiple phases, each designed to move

Read more
Ethical Hacking IT Security 

Why is Social Engineering Successful?

September 26, 2020 Krishna security attacks, social engineering, Why is Social Engineering Successful?

Why has social engineering been successful, and why will it continue to be so? To answer this, you must first

Read more
Ethical Hacking IT Security 

Social Engineering Countermeasures

June 27, 2020 Krishna Attacks, Computer Security, cyber security, HACKERS, HACKING, IT- Security, kali linux, Linux, security attacks, social engineering, Social Engineering Countermeasures

Social engineering    will    put    your    layered    defenses    to    the    true    test.    Even    with    strong    security controls,    a    naïve    or    untrained  

Read more
Ethical Hacking IT Security 

Mapping the Network

June 27, 2020 Krishna Attacks, HACKERS, HACKING, IT- Security, Linux, Mapping the Network, Networking Attacks, security, security attacks

As    part    of    mapping    out    your    network,    you    can    search    public    databases    and    resources    to see    what    other    people    know  

Read more
Tutorial 

INTERNET SECURITY

January 4, 2020January 4, 2020 Krishna internet security, internet security issue, security, security attacks

“INTRODUCTION” In order to provide useful services or to allow people to perform tasks more conveniently, computer systems are attached

Read more

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.