Skip to content
Thursday, June 19, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

security

Ethical Hacking IT Security 

The Inner Workings of an IDS

September 30, 2020 Krishna IDS, security, The Inner Workings of an IDS

The main purpose of an IDS is to detect and alert an administrator about an attack. The administrator can then

Read more
Ethical Hacking IT Security 

Hacking Bluetooth

September 30, 2020 Krishna Bluejacking, Bluesnarfing, Bluetooth, HACKERS, HACKING, Hacking Bluetooth, network security, security

Another wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth refers to

Read more
Ethical Hacking IT Security 

Wireless Antennas

September 29, 2020 Krishna HACKERS, HACKING, security, wireless, Wireless Antennas

Something else you should be aware of when talking about wireless networks is the type of antenna in use. If

Read more
Ethical Hacking IT Security 

Wi-Fi Authentication Modes

September 29, 2020 Krishna Authentication, networks, Securioty, security, Wi-Fi, Wi-Fi Authentication Modes

When you are authenticating clients to a wireless network, two processes are available. The first, known as open system authentication,

Read more
Ethical Hacking IT Security 

Wireless Vocabulary

September 29, 2020 Krishna HACKING, security, Vocabulary, wireless, Wireless Vocabulary

TA B L E – Common wireless terms

Read more
Ethical Hacking IT Security 

Exploring Defensive Strategies

September 28, 2020 Krishna cyber security, Defensive, Exploring Defensive Strategies, HACKERS, HACKING, security, Strategies

Session hijacking relies, in part, on many of the prerequisites needed to successfully sniff a network. For instance, session hijacking

Read more
Ethical Hacking IT Security 

Session Hijacking and Web Apps

September 28, 2020 Krishna HACKERS, HACKING, security, Session Hijacking, Session Hijacking and Web Apps, Web Apps

Session hijacking at the application level focuses on gaining access to a host by obtaining legitimate session IDs from the

Read more
Ethical Hacking IT Security 

Active and Passive Attacks

September 28, 2020 Krishna Active and Passive Attacks, Active Attacks, Attacks, cyber attacks, HACKERS, Passive Attacks, security

You can categorize a session hijacking attack as either an active attack or a passive attack. Let’s look at both.

Read more
Ethical Hacking IT Security 

Session Hijacking

September 28, 2020 Krishna HACKING, Hijacking, security, session, Session Hijacking

Session hijacking is synonymous with a stolen session, in which an attacker intercepts and takes over a legitimately established session

Read more
Ethical Hacking IT Security 

Types of DoS Attacks

September 27, 2020 Krishna Attacks, DoS attacks, HACKERS, HACKING, security, Types of DoS Attacks

DoS attacks come in many flavors, each of which is critical to your understanding of the nature of the DoS

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.