© 2022 Hashnode
#cybersecurity-1
Why Is Address Resolution Protocol Poisoning Possible? ARP poisoning is possible because ARP, as a protocol, does not have any type of security. It is simply not designed to be secure. Devices on the …
When you watch the news of people getting breached, it could have been avoided by following some basics in most cases. 1 – Never reuse passwords. If one account gets compromised, then all the others g…
What Does Rootkit Mean? Rootkits are a type of malware that is designed so that it can remain hidden on your computer. They can contain some tools, ranging from programs that allow hackers to steal …
CROSS SİTE REQUEST FORGERY (CSRF) NEDİR ? Basit bir google araştırması ile elde ettiğim şekilde açıklayacağım. Türkçe açılımı “Siteler Arası İstek Sahtekârlığı” şeklinde olan CSRF zafiyeti; web uygula…
What Does "Spam" Mean? "What is Spam? | Definition & Spam Varieties." Computer spam, text spam, and phone spam constitute spam, undesired, unsolicited digital communication transmitted in volume. Spam…
Hi Readers My name is Sunain and this is Windows Privilege Escalation from my viewpoint. During this series, I will discuss many ways to escalate privileges on Windows-based machines. In the last arti…
Same Origin policy As per the documentation in Mozilla Web Docs It helps isolate potentially malicious documents, reducing possible attack vectors. For example, it prevents a malicious website on th…
What Is an Access Token? An access token is a tiny piece of code that contains a large amount of data. Information about the user, permissions, groups, and timeframes is embedded within one token. It…
What Does (SSL) Secure Sockets Layer Mean? SSL (Secure Sockets Layer) and its successor, TLS (Transport Layer Security), are protocols for establishing authenticated and encrypted links between netwo…
What Does Keylogger Mean? What exactly is a Keylogger? A keylogger is a piece of software that logs the keys you press on a keyboard. When you write passwords, credit card numbers, personal communica…