In this tutorial, you will learn the basics of reverse shells and how to setup one on your Linux machine, and then we’ll discuss ways to prevent it.
This guide requires you to understand the basic networking client-server model where … Read more
Django is a popular high-level open-source Python web framework. It is well known for rapid development and unit testing included in the framework.
Django works well for most web applications and comes with essential tools to solve common issues such … Read more
With the advancement in technology and the current pandemic situation, the world has shifted to remote work on a large scale. Cybercriminals have become more active and come with more sophisticated ways to attack. The security risk at many organizations … Read more
Port scanning is the act of scanning a network or hosts in order to determine which network ports are open and thus which service they provide.
While the web (also known as the World Wide Web) is the most used … Read more
Say you want to send an important file, how do you ensure that the receiver will get the exact file without any changes ?
Well, the most common approach is use hashing, which translates the file information into fixed sized … Read more
What is ARP
Address resolution protocol (ARP) is one the simplest network protocols. It simply maps IP to physical addresses. When used with Ethernet, IP are mapped to MAC addresses.
Though simple, it is very important for interconnection hosts in … Read more
A regular expression is a sequence of characters defining a search pattern. It is one of the most powerful tools when it comes to mass text data filtering and modification.
Regular expressions often scares the newcomers but even with a … Read more
TCP/IP is the backbone on modern networks including the Internet. Understanding how information travel across a network is crucial for network and system administrators. Often, they will have to capture and analyze packets going in and out of servers … Read more
With the advancement in technology, there is an increasing risk of cyber-attacks. Websites are becoming more vulnerable to these attacks due to a lot of reasons. SQL injection attacks are increasing rapidly, and the security of web applications is at … Read more
Because of its multi-user features, Linux stands as the most liked operating system among people especially for those who love to run commands. Like its other exceptional characteristics, configuration and managing of users and groups is also a significant part … Read more