Skip to content
Saturday, May 10, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

social engineering

Ethical Hacking IT Security 

What Is the Impact of Social Engineering?

September 26, 2020 Krishna social engineering, social engineering Attacks, What Is the Impact of Social Engineering?

Social engineering can have many potential outcomes on an organization, some obvious and some less so. It is important that

Read more
Ethical Hacking IT Security 

Social-engineering Phases

September 26, 2020 Krishna security attacks, social engineering, Social-engineering Phases

Social engineering, like the other attacks we have explored in this book, consists of multiple phases, each designed to move

Read more
Ethical Hacking IT Security 

Why is Social Engineering Successful?

September 26, 2020 Krishna security attacks, social engineering, Why is Social Engineering Successful?

Why has social engineering been successful, and why will it continue to be so? To answer this, you must first

Read more
Ethical Hacking IT Security 

What Is Social Engineering?

September 26, 2020 Krishna security, social engineering, What Is Social Engineering?

Social engineering is a term that is widely used but poorly understood. It’s generally defined as any type of attack

Read more
Ethical Hacking IT Security 

The Footprinting Process

September 21, 2020 Krishna Footprinting, google hacking, Location and Geography, Network Information, security, social engineering, Social Networking and Information Gathering, The Footprinting Process, Working with E-mail

There are many steps in the footprinting process, each of which will yield a different type of information. Remember to

Read more
Ethical Hacking IT Security 

Social Engineering Countermeasures

June 27, 2020 Krishna Attacks, Computer Security, cyber security, HACKERS, HACKING, IT- Security, kali linux, Linux, security attacks, social engineering, Social Engineering Countermeasures

Social engineering    will    put    your    layered    defenses    to    the    true    test.    Even    with    strong    security controls,    a    naïve    or    untrained  

Read more
Ethical Hacking IT Security 

Defending Against Social Engineering Attacks

June 19, 2020 Krishna BLACK HAT HACKER, Defending Against Social Engineering Attacks, ethical hacker, gray hat hacker, HACKERS, security, Social Attacks, social engineering

Hardening your environment to withstand SEAs, especially targeted ones, is more a matter of training than a traditional security control.

Read more

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.