Skip to content
Wednesday, June 18, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

security

NEWS 

Operators must stop installing Huawei 5G kit from next September

December 1, 2020 Krishna 5G, CYBERSECURITY, GOVERNMENT AND POLITICS, huawei, Operators must stop installing Huawei 5G kit from next September, security

The UK government has announced that UK mobile operators must stop installing new Huawei 5G equipment after September next year,

Read more
windows 

Windows 10 security apps

November 23, 2020 Krishna App list, apps, security, Security Apps, windows 10, Windows 10 security apps, Windows Security

Kaspersky Now Password Padlock McAfee Central Total Virus Scanner VPN Shield Subscription Shredder8  

Read more
windows 

Windows Security Tools

November 21, 2020 Krishna IT- Security, security, security tools, system security, tools, Windows, Windows Security, Windows Security Tools, windows tools

1) NordLocker 2) Browser Encryption 3) Virtual Private Networks 4) Password Manager 5) Install Solid Anti-Virus Software  

Read more
NEWS 

NCSC forced to ramp up response to escalating cyber attacks during pandemic

November 4, 2020 Krishna coronavirus, cyber security, NCSC forced to ramp up response to escalating cyber attacks during pandemic, security, SECURITY IN THE MODERN WORLD, UK

The National Cyber Security Centre (NCSC) has defended the UK from more than 700 cyber attacks in the last year

Read more
Ethical Hacking IT Security 

Evading Firewalls

September 30, 2020 Krishna Evading Firewalls, Firewalls, Firewalls Security, Fragmentation, HACKERS, HACKING, IP Address Spoofing, IP Addresses to Access Websites, security

IP Address Spoofing One effective way an attacker can evade a firewall is to appear as something else, such as

Read more
Ethical Hacking IT Security 

Honeypots

September 30, 2020 Krishna Firewalls, HACKERS, HACKING, High vs. Low Interaction, Honeypots, Honeypots Security, security

One of the more interesting systems you will encounter is a honeypot. A honeypot may sound like something out of

Read more
Ethical Hacking IT Security 

What’s That Firewall Running?

September 30, 2020 Krishna Firewall Running, Firewalls, Firewalls Security, HACKERS, HACKING, security, What’s That Firewall Running?

To determine a type of firewall and even a brand, you can use your experience with port scanning and tools

Read more
Ethical Hacking IT Security 

Firewall Configurations

September 30, 2020 Krishna Bastion Host, configuration, Demilitarized Zone (DMZ), Firewall Configurations, firewall security, Firewalls, HACKERS, HACKING, Multihomed Firewall, Screened Subnet, security

Not all firewalls or firewall setups are created equal, so you need to be familiar with each setup and how

Read more
Ethical Hacking IT Security 

Firewalls

September 30, 2020 Krishna FIREWALL, Firewalls, HACKERS, HACKING, security, system firewall

Firewalls are another protective device for networks that stand in the way of a penetration tester or attacker. Firewalls represent

Read more
Ethical Hacking IT Security 

IDS Detection Methods

September 30, 2020 Krishna Anomaly Detection, HACKERS, HACKING, IDS, IDS Detection, IDS Detection Methods, Methods, Protocol Anomaly Detection, security, Signature Detection

Signature Detection The first form of detection or recognition is based on signature; this method is also sometimes called misuse

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.