How to Review Logs using Windows PowerShell
Windows Powershell is similar to a terminal on Linux systems. It is a proprietary Windows command-line shell and can be...
Windows Powershell is similar to a terminal on Linux systems. It is a proprietary Windows command-line shell and can be...
CVSS, short for Common Vulnerability Scoring System, is a method of assigning a numerical value of range 1 to 10,...
This blog discusses technologies that are used to secure hardware devices such as firewalls, routers, smart devices, etc. Technologies covered...
Password Managers are the solution for managing and storing different passwords securely. Remember one thing, the password is the first...
Cryptography is a key technology to secure your data on the Internet. It is crucial for protecting Personal Identifiable Information...
Bluetooth is a known technology among the general public as all are using it while connecting headphones, earphones, etc. But...
SMS for multi-factor authentication (MFA) is an awesome and easy method to add one more layer of security. As cyber...
Open Source Intelligence (OSINT) is not an unknown term for most people who have an interest in technology. It denotes...
PimEyes is a great OSINT tool for Reverse Image Search & Facial Recognition available on the internet. In simple words,...
OSINT stands for Open Source Intelligence which is used for getting information available in the public domain related to the...
OWASP is a non-profit organization that publishes the Top 10 categories of vulnerability types of web applications. This blog lists...
Firmware Analysis and Comparison Tool (FACT) is an automation toolkit to analyze binaries of IoT devices, network devices, drones, UEFI,...
readelf command is used to analyze binaries based on Linux. This is most common tool used by security professionals to...
Whenever you engage in the security assessment of Windows-based targets, password cracking is one of the activities that need to...