trojans, Backdoors, Viruses, and Worms
Trojans and Backdoors:- Trojans and backdoors are types of malware used to infect and compromise computer systems. A Trojan is […]
trojans, Backdoors, Viruses, and Worms Read More »
Trojans and Backdoors:- Trojans and backdoors are types of malware used to infect and compromise computer systems. A Trojan is […]
trojans, Backdoors, Viruses, and Worms Read More »
Footprinting In Ethical Hacking is the first step which means gathering all the information about the target and network. Information
Footprinting in ethical hacking Read More »
Vulnerability analysis or Assessment is the process of finding the weakness or bugs in an environment, either in OS, network,
Vulnerability Analysis Read More »
Local file inclusion is a vulnerability which an attacker can exploit to include/read files. It occurs when an application uses
Local File Inclusion Read More »
Security Vulnerabilities MOST EXPLOITED SECURITY VULNERABILITIES FROM 2016 TO 2019 ARE LISTED BELOW: 1. CVE-2017-11882 Microsoft office 2007 service pack
Most known security vulnerabilities Read More »
What is a crime and how is it associated with Cybersecurity and Information Technology? Crime is both a social and
Laws against Cyber Crimes Read More »
WHAT ARE MALWARE? Malware is basically ‘MALicious softWARES’ which are used intentionally to cause damage to systems and networks. What
WHAT IS IOT? The Internet of things describes the network of physical objects that are embedded with sensors, software, WiFi,
Introduction to IoT penetration testing Read More »