Skip to content
Saturday, May 10, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

virus

Ethical Hacking IT Security 

Ethical Hacking: Worm, Virus & Trojan Horse

August 28, 2021 eduguru 0 Comments and Worm Differential Table, and Worms countermeasures, Ethical Hacking: Worm, Trojan, Trojans, virus, Virus & Trojan Horse, viruses, What is a Trojan horse, What is a Virus?, What is a worm?

Ethical Hacking: Worm, Virus & Trojan Horse Some of the skills that hackers have are programming and computer networking skills.

Read more
Ethical Hacking IT Security 

Process of developing a virus

September 25, 2020 Krishna HACKERS, Process of developing a virus, security, virus, virus development

The process of developing a virus is very methodical. The author is concerned with creating an effective virus that can

Read more
computer viruses 

Pictures Can Give You Computer Viruses

May 27, 2020 Krishna anti-virus, Computer virus, Pictures Can Give You Computer Viruses, security, virus

Nope. Well, not yet. Pictures are just data files that are read by special programs. But, someday, someone may come

Read more
computer viruses 

Types of Viruses

May 27, 2020 Krishna anti-virus, Boot sector, macro, security, Stealth viruses, Types of Viruses, virus

To date there are three primary types of viruses that exist today: file-infector viruses, which attach themselves to program files;

Read more
computer viruses 

The People Who Write Viruses

May 27, 2020 Krishna antivirus, Hacker social values, Little regard for the rights of other people, Little respect for the property of others, Looking at Viruses under the Microscope, security, The People Who Write Viruses, virus

Sometimes I think that it helps to understand a little bit more about the people who perpetrate crimes, in order

Read more
computer viruses 

How Early Viruses Spread from Computer to Computer

May 27, 2020 Krishna anti-virus, How Early Viruses Spread from Computer to Computer, security, virus, Viruses and the Losers Who Write Them

In the mid-to-late 1980s, data was most often transferred from computer to computer by using floppy disks and so-called bulletin

Read more
computer viruses 

The Origins of Antivirus Tools

May 27, 2020 Krishna anti virus tools, anti-virus, early anti virus, security, The Origins of Antivirus Tools, virus

In 1991, Symantec released the first version of Norton AntiVirus. Norton was a popular brand name among computer technophiles from

Read more
computer viruses 

The People Who Write Viruses

May 23, 2020 Krishna Hacker social values (sort of), security, The People Who Write Viruses, virus, Viruses and the Losers Who Write Them

Sometimes I think that it helps to understand a little bit more about the people who perpetrate crimes, in order

Read more
computer viruses 

How Early Viruses Spread from Computer to Computer

May 23, 2020 Krishna How Early Viruses Spread from Computer to Computer, security, Sneaking in via BBSs, Stowing away on floppy disks, virus, Viruses and the Losers Who Write Them

In the mid-to-late 1980s, data was most often transferred from computer to computer by using floppy disks and so-called bulletin

Read more
computer viruses 

Blocking Spyware

May 23, 2020 Krishna Blocking spyware, spyware, virus

Spyware is a wide-reaching term that describes software used to monitor your Internet usage patterns, as well as software that

Read more
  • ← Previous

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.