Nehal IngoleforRead & Learnlearnwithnehal.hashnode.dev·a day agoCyber Security And Confusion MatrixHello Everyone In this article we will discuss what role does Confusion Matrix plays in the Cybersecurity field?? As we all know that cybersecurity is very important as they are responsible for our security from cybercrime and the tools and tech they...DiscussFalseNegative
Jay Tillujaytillu.in·Mar 18, 2024What is a Firewall in Networking?A firewall is a security system that acts as a gatekeeper for your computer network. It monitors incoming and outgoing traffic based on a set of rules, deciding whether to allow or block specific data packets. In essence, it creates a barrier between...DiscussCybersecurity#cybersecurity
Joel O.joelodey.hashnode.dev·Mar 18, 2024Lab: SQL injection UNION attack, determining the number of columns returned by the querySQL injection is a serious security risk for web applications, and Burp Suite can be used to identify and address these vulnerabilities. This guide shows how to use Burp Suite to intercept and modify requests, specifically focusing on the product cat...DiscussPortSwigger SQL injection (SQLi) Labsportswigger
Ben-Hur Santos OttforGuia de AppSec :: Blogblog.guiadeappsec.com.br·Mar 17, 2024AppSec Newsletter 0027Links [artigo] Opening Pandora’s box - Supply Chain Insider Threats in Open Source projects [artigo] Docker Security – Step-by-Step Hardening (Docker Hardening) (um dos guias mais completos que já vi) [ferramenta] Secret scanning AI-generated cust...Discuss·1 like·51 readsappsec
Bianca DominguezProawscloudgirl.hashnode.dev·Mar 16, 2024How To Write A Simple Portscanner Using Python 3This is a simple Python script that scans a target host for open ports using the socket module. By calling the portscanner() function with a port number as an argument, the script will check if the port is open or closed and print the result. import ...DiscussPython
Jay Tillujaytillu.in·Mar 15, 2024What is the WEP Protocol in Networking?The Wired Equivalent Privacy Protocol, often abbreviated as WEP, was an early attempt to secure wireless network communication. It was introduced as part of the original IEEE 802.11 wireless networking standard, which is commonly known as Wi-Fi. Desi...DiscussCybersecurityWEP
Jay Tillujaytillu.in·Mar 15, 2024Difference between POP, IMAP and SMTPEver wondered how your email magically appears on your phone, computer, or tablet? The answer lies in a trio of hardworking protocols: POP (Post Office Protocol), IMAP (Internet Message Access Protocol), and SMTP (Simple Mail Transfer Protocol). Each...DiscussCybersecurity#cybersecurity
Jay Tillujaytillu.in·Mar 15, 2024What is SMTP in Networking?SMTP, or Simple Mail Transfer Protocol, is the standard protocol used for sending email messages across networks. SMTP isn't directly involved with how you view or manage your emails. Instead, it acts as the communication channel between email client...DiscussCybersecuritySecurity
Jay Tillujaytillu.in·Mar 15, 2024What is Internet Message Access Protocol (IMAP)?Imagine checking your work email on your computer, then replying to the same message later from your phone, and finding it seamlessly updated on both devices. This magic lies in a clever protocol called IMAP (Internet Message Access Protocol). IMAP: ...DiscussCybersecurityprotocols
She Code Africa NairobiforShe Code Africa Nairobiscanairobi.hashnode.dev·Mar 15, 2024Safeguarding Digital Empowerment: Cybersecurity and Data Privacy for Women.As we celebrate International Women's Month, it's time to shed light on the crucial topics of cybersecurity and data privacy for women in the digital world. In this article, we'll dive into the intersection of these important issues with women's empo...DiscussWomen's History Month