Short Tutorial: Understanding /etc/shadow file
The /etc/shadow file stores passwords in the encrypted format of an available user account on the operating system. This blog...
The /etc/shadow file stores passwords in the encrypted format of an available user account on the operating system. This blog...
The /etc/passwd file stores information related to available user accounts on the operating system. This blog explains the basics of...
How to do an audit of AI systems? What should be the scope of audit of AI systems? What are...
Burp Suite is a popular application security solution to test web applications for security issues. This blog list out Burp...
Automated scanners are a great way to find issues and vulnerabilities in database servers. Scanners also help in configuring the...
Windows Powershell is similar to a terminal on Linux systems. It is a proprietary Windows command-line shell and can be...
CVSS, short for Common Vulnerability Scoring System, is a method of assigning a numerical value of range 1 to 10,...
This blog discusses technologies that are used to secure hardware devices such as firewalls, routers, smart devices, etc. Technologies covered...
Password Managers are the solution for managing and storing different passwords securely. Remember one thing, the password is the first...
Cryptography is a key pillar to secure your data on the Internet. It provides confidentiality, integrity, non-repudiation, and authenticity. Confidentiality...
Bluetooth is a known technology among the general public as all are using it while connecting headphones, earphones, etc. But...
SMS for multi-factor authentication (MFA) is an awesome and easy method to add one more layer of security. As cyber...
Open Source Intelligence (OSINT) is not a unknown term for most of the people who have a interest in technology....
PimEyes is a great OSINT tool for Reverse Image Search & Facial Recognition available on the internet. In simple words,...