Approaches of Network Security
Organisations can choose from several approaches to network security. A particular approach, or paradigm, will influence all subsequent security decisions and set the tone for the entire...
Security Terminology
Security professionals have specific terminology. Individuals or system administrators having experience in network administration are probably already familiar with most of these terms. Although most hacking terminology...
Threat Classification
Your network certainly faces real security threats, and these threats can manifest themselves in a variety forms. There are different ways one might choose to classify the...
Basic Network Utilities
Ipconfig
The first thing you want to do is get information about your own system. To accomplish this, you must get a command prompt....
Networking Basics
A network is simply a way for machines/computers to communicate.
At the physical level, it consists of all the machines you want to connect...
Money Stealing Attack ! Ransomware
What Is Ransomware?
Ransomware is a Malware. This malware Lock your photos, videos, files and documents and this files can only be...
OWASP Top 10 Web Application Vulnerability 2020
1. Injection
Injection flaws occur when untrusted data sent to an interpreter through a form input or some other data submission to a web...
Introduction To Cyber Security
Introduction
Cybersecurity is the protection of Internet-connected systems, including hardware, software, and data from cyber-attacks. It can be made up of two words one...
[HINDI] What is DoS attack and DDoS attack?
Guys ye jo dono attack aapne abhi jo topic mai dekha ya pehle bhi shyad kbhi kahi dekha hoga ye cyber attack hai jo hackers rehte...
[HINDI] What is juice jacking? Think twice before using public USB ports
What is juice jacking?
Hello Guys aaj hum aaye hai ek aur interesting topic jo hai juice jacking toh phir abhi iska naam sunke...