Skip to content
Thursday, June 19, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

security

Ethical Hacking IT Security 

Checking for Live Systems

September 21, 2020 Krishna Checking for Live Systems, checking system, ETHICAL HACKING, live system, security

How do you check for live systems in a targeted environment? There are plenty of ways to accomplish this. Some

Read more
Ethical Hacking IT Security 

The Footprinting Process

September 21, 2020 Krishna Footprinting, google hacking, Location and Geography, Network Information, security, social engineering, Social Networking and Information Gathering, The Footprinting Process, Working with E-mail

There are many steps in the footprinting process, each of which will yield a different type of information. Remember to

Read more
Ethical Hacking IT Security 

What Is Footprinting?

September 21, 2020 Krishna cryptography, security, What Is Footprinting?

Now let’s circle back around to the first step in the process of ethical hacking: footprinting. Footprinting, or reconnaissance, is

Read more
Ethical Hacking IT Security 

Network Security

September 19, 2020 Krishna internet security, network security, security

Firewalls and IDS/IPS appliances are part of a secure network, but in this article we’ll look briefly at the placement

Read more
IT Security 

what is google dork?

August 2, 2020 Krishna dork, dork list, google dork, google dork list, google search, security, what is google dork?

A Google dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators

Read more
IT Security 

SAFE BROWSING

July 31, 2020 Krishna cyber, cyber attacks, cyber security, cyber space, cynet attacks, SAFE BROWSING, security, security issue

Internet security is a matter of great concern for internet users. It is important to know if a website is

Read more
IT Security 

EMAIL SECURITY TIPS

July 31, 2020 Krishna cyber, cyber security, e-mail, e-mail security, e-mail security tips, EMAIL SECURITY TIPS, security

1. Don’t open email attachments that you are not expecting, or which have come from someone you do not know.

Read more
IT Security 

MAJOR ISSUES WITH WLAN

July 31, 2020 Krishna cyber, cyber security, issue in lan. major issues wlan, MAJOR ISSUES WITH WLAN, security, WLAN, Wlan security

Having said that, WLAN are also as prone to various attacks as their counterpart wired LNAs are. Actually WLANs are

Read more
Uncategorized 

WHAT IS WIRELESS LAN?

July 31, 2020 Krishna cyber, cyber attacks, security, WHAT IS WIRELESS LAN?, wireless, wireless lan security. cyber security

The Wireless LAN or WLAN is becoming a popular way to connect devices such as computers these days. In offices

Read more
IT Security 

SOME CYBER CRIME INCIDENTS

July 30, 2020 Krishna cyber, cyber attacks, cyber security, cyber security attacks, security, SOME CYBER CRIME INCIDENTS

In the current section, we will discuss some of the common cyber crimes and fruads incidents over internet so that

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.