Skip to content
Saturday, June 21, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

security

Ethical Hacking IT Security linux 

Why Simulating an Insider Attack Is Important??

June 19, 2020June 19, 2020 Krishna attack, insider attack, IT- Security, security, Simulating, Why Simulating an Insider Attack Is Important

The importance of assessing an organization’s vulnerability to attack from the inside is virtually self-evident. With the exception of the

Read more
Ethical Hacking IT Security 

Defending Against Social Engineering Attacks

June 19, 2020 Krishna BLACK HAT HACKER, Defending Against Social Engineering Attacks, ethical hacker, gray hat hacker, HACKERS, security, Social Attacks, social engineering

Hardening your environment to withstand SEAs, especially targeted ones, is more a matter of training than a traditional security control.

Read more
Ethical Hacking IT Security 

Preparing Yourself for Face-to-Face Attacks

June 19, 2020 Krishna Attacks, Face to Face Attacks, HACKERS, IT- Security, Preparing Yourself for Face-to-Face Attacks, security

It’s one thing to send an e-mail to or chat with someone online during a SEA, but it’s quite another

Read more
Ethical Hacking IT Security 

Conducting a Social Engineering Attack

June 18, 2020 Krishna Conducting a Social Engineering Attack, HACKERS, HACKING ATTACKS, security, Social Engineering Attack

It is important to discuss with your client your intention to conduct social engineering attacks, whether internal or external, before

Read more
Ethical Hacking IT Security 

Organization for Internet Safety (OIS)

June 18, 2020 Krishna Hacking Act, IT ACT, IT- Security, Organization for Internet Safety (OIS), security

There are three basic types of vulnerability disclosures: full disclosure, partial disclosure, and nondisclosure. Each type has its advocates, and

Read more
Ethical Hacking IT Security 

Securely Protect Yourself Against Cyber Trespass Act (SPY Act)

June 18, 2020 Krishna Hacking Act, IT- Security, Linux, Securely Protect Yourself Against Cyber Trespass Act (SPY Act), security

The Securely Protect Yourself Against Cyber Trespass (SPY Act) was passed by the House of Representatives, but never voted on

Read more
Ethical Hacking IT Security 

Cyber Security Enhancement Act of 2002

June 18, 2020 Krishna cyber security, Cyber Security Enhancement Act of 2002, HACKING, IT ACT, security

Several years ago, Congress determined that the legal system still allowed for too much leeway for certain types of computer

Read more
Ethical Hacking IT Security 

Recognizing the Gray Areas in Security

June 18, 2020June 18, 2020 Krishna ETHICAL HACKING, gray Area in security, gray hat hacker, hacker, HACKING, Recognizing the Gray Areas in Security, security

Since technology can be used by the good and bad guys, there is always a fine line that separates the

Read more
Ethical Hacking IT Security 

What is Cryptography?

June 17, 2020 Krishna cryptography, security, What is Cryptography?

Look at the following two pieces of text: The text on the left side is a secret message. The message

Read more
IT Security 

External Data Is at Risk, Too

June 16, 2020 Krishna External Data Is at Risk, HACKING, security, too

Even the strongest safe deposit box can be opened with the right key. Your valuables might be safe in the

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.