With the advancement in technology and the current pandemic situation, the world has shifted to remote work on a large scale. Cybercriminals have become more active and come with more sophisticated ways to attack. The security risk at many organizations … Read more
Docker is an open-source virtualization platform. It went open source in 2013 and has seen rapid adoption in companies since then. Docker offers OS-level virtualization to package software such as web servers, databases into containers. This essentially removes the virtual … Read more
Port scanning is the act of scanning a network or hosts in order to determine which network ports are open and thus which service they provide.
While the web (also known as the World Wide Web) is the most used … Read more
Say you want to send an important file, how do you ensure that the receiver will get the exact file without any changes ?
Well, the most common approach is use hashing, which translates the file information into fixed sized … Read more
What is ARP
Address resolution protocol (ARP) is one the simplest network protocols. It simply maps IP to physical addresses. When used with Ethernet, IP are mapped to MAC addresses.
Though simple, it is very important for interconnection hosts in … Read more
A regular expression is a sequence of characters defining a search pattern. It is one of the most powerful tools when it comes to mass text data filtering and modification.
Regular expressions often scares the newcomers but even with a … Read more
TCP/IP is the backbone on modern networks including the Internet. Understanding how information travel across a network is crucial for network and system administrators. Often, they will have to capture and analyze packets going in and out of servers … Read more
With the advancement in technology, there is an increasing risk of cyber-attacks. Websites are becoming more vulnerable to these attacks due to a lot of reasons. SQL injection attacks are increasing rapidly, and the security of web applications is at … Read more
Because of its multi-user features, Linux stands as the most liked operating system among people especially for those who love to run commands. Like its other exceptional characteristics, configuration and managing of users and groups is also a significant part … Read more
What is Steganography ?
Steganography is the practice of hiding information within a non-secret information. Early examples are writing secret messages on letters with invisible ink.
A more modern usage of Steganography in the information era is hiding data in … Read more