Skip to content

Tag Archives: Cyber-security

Authorization: The organization gives official permission to access something or do something with the network or application. For example, suppose an organization XYZ gives you… Read More
Cross-Site Request Forgery is a vulnerability found in web applications that lets a third party attacker perform sensitive actions on a user’s behalf. The exploitation… Read More
Spoofing: Spoofing is a type of attack on computer device in which the attacker tries to steal the identity of the legitimate user and act… Read More
Nmap is a free and open-source utility which is used to scan networks and security auditing. Nmap can discover hosts and services on a computer… Read More
In Cyber Stalking, a cyber criminal uses the internet to consistently threaten somebody. This crime is often perpetrated through email, social media, and the other… Read More
Cyber crime is taken very seriously by law enforcement. In the early long periods of the cyber security world, the standard cyber criminals were teenagers… Read More
Pre-requisite: GDB (Step by Step Introduction) A BufferOverflow often occurs when the content inside the defined variable is copied to another variable without doing Bound… Read More
In a web application, there are two actors usually: the client and the server. The third entity that remains unnoticed most of the time is… Read More
Virus: Virus is a computer program or software that connect itself to another software or computer program to harm computer system. When the computer program… Read More
What image originates to mind when you hear the term Computer Crime? One may think of the hackers, which are locked up in a dark… Read More
The year 2018 saw some massive data breaches. The news of a new breach was so frequent that even non-technical people started being concerned about… Read More
Malware is the short form for malicious software. Malicious software has a variety of damage capabilities. Some just put a silent keylogger on your device… Read More
Cyber crime or computer-oriented crime is a crime that includes a computer and a network. The computer may have been used in the execution of… Read More
A Hacker is a person who is intensely interested in the mysterious workings of any computer operating system. Hackers are most often programmers. They gather… Read More

Start Your Coding Journey Now!