Skip to content
Saturday, May 10, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

Vulnerability

Ethical Hacking IT Security 

Vulnerability Research and Tools

September 17, 2020 Krishna Vulnerability, Vulnerability Research and Tools, vulnerability tools

`An important part of your toolkit as an ethical hacker will be the information gathered from vulnerability research. This process

Read more
Ethical Hacking IT Security 

Using the Ethical Hacking Process

June 25, 2020 Krishna attackers, HACKERS, Hacking Security, security, The specific deliverables, Using the Ethical Hacking Process, Vulnerability

Like    practically    any    IT    or    security    project,    you    need    to    plan    your    security    testing.    It’s been    said    that action    without  

Read more
Ethical Hacking IT Security Tutorial Uncategorized 

Hacking & Ethical Hacking

January 17, 2020January 17, 2020 Krishna ETHICAL HACKING, HACKING, Vulnerability

Hacking Gaining access to a system that you are not supposed to have access is considered as hacking. For example:

Read more
Ethical Hacking IT Security Networking 

PENETRATION TESTING VS VULNERABILITY ASSESSMENT

January 11, 2020 Krishna PENETRATION TESTING, PENETRATION TESTING VS VULNERABILITY ASSESSMENT, Vulnerability

There is often some confusion between penetration testing and vulnerability assessment. The two terms are related but penetration testing has

Read more
Ethical Hacking IT Security Networking 

VULNERABILITY ASSESSMENTS

January 10, 2020 Krishna Linux, NETWORKING, networks, UNIX, Vulnerability, VULNERABILITY ASSESSMENTS

THE CHALLENGES OF VULNERABILITY ASSESSMENTS Network vulnerability assessments are widely recognized as a crucial component of network security and a

Read more
IT Security linux Tutorial 

HOW SECURE SHOULD MY LINUX BE?

January 9, 2020 Krishna Impact, linux security, secure, security, Threat, Vulnerability

Even if it were possible to lock a system down air tight, it is not always practical to invest the

Read more

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.