Skip to content
Thursday, June 19, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

security

Ethical Hacking IT Security 

Mistakes in Social Media and Social Networking

September 27, 2020 Krishna Mistakes in Social Media, Mistakes in Social Media and Social Networking, security, social media, Social networking

Social media can be made safer if you take simple steps to strengthen your accounts. In fact, it has been

Read more
Ethical Hacking IT Security 

What Is Social Networking?

September 27, 2020 Krishna HACKERS, HACKING, security, Social networking, What Is Social Networking?

Over the last decade, some of the biggest security threats have come from the use of social networking. The rapid

Read more
Ethical Hacking IT Security 

Common Targets of Social Engineering

September 26, 2020 Krishna Common Target, Common Targets of Social Engineering, HACKERS, security, social engineering Attacks

An attacker will look for targets of opportunity or potential victims who have the most to offer. Some common targets

Read more
Ethical Hacking IT Security 

What Is Social Engineering?

September 26, 2020 Krishna security, social engineering, What Is Social Engineering?

Social engineering is a term that is widely used but poorly understood. It’s generally defined as any type of attack

Read more
Ethical Hacking IT Security 

Sniffing Tools

September 26, 2020 Krishna HACKERS, HACKING, security, Sniffing Tools, tools

Sniffing tools are extremely common applications. A few interesting ones are: Wireshark One of the most widely known and used

Read more
Ethical Hacking IT Security 

Overt and Covert Channels

September 25, 2020 Krishna Channels, HACKERS, HACKING, Overt and Covert Channels, security

When you are working with Trojans and other malware, you need to be aware of covert and overt channels. As

Read more
Ethical Hacking IT Security 

Tools for Creating Trojans

September 25, 2020 Krishna Creating Trojans, HACKERS, HACKING, security, Tools for Creating Trojans, Trojans

A wide range of tools exist that are used to take control of a victim’s system and leave behind a

Read more
Ethical Hacking IT Security 

Detecting Trojans and Viruses

September 25, 2020 Krishna Detecting Trojans and Viruses, HACKERS, HACKING, Malware, security, Trojans, viruses

A Trojan can be detected in many ways. Port scanning, which can prove very effective if you know what to

Read more
Ethical Hacking IT Security 

Trojans

September 25, 2020 Krishna HACKERS, HACKING, Malware, security, Trojans, warms

One of the older and potentially widely misunderstood forms of malware is the Trojan. Simply put, a Trojan is a

Read more
Ethical Hacking IT Security 

Scareware

September 25, 2020 Krishna HACKERS, HACKING, Malware, Scareware, security

A relatively new type of software is scareware. This type of malware warns the victim of potential harm that could

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.