Theodora Egburediisi.hashnode.dev·2 hours agoConfiguring Anti-Malware Policy, Safe Attachment and Safe Link Policies.Creating Anti-Malware Policy. Protect your organization's email from malware, including what actions to take and who to notify if malware is detected Login to you Microsoft Defender XDR Portal. Go to Email & Collaboration, click on the dropdown and s...M365 COMMUNITY
AceHack-4-0acehack4.hashnode.dev·2 hours agoWhy March is the Perfect Month for Hackathons: AceHack 4.0 EditionAs the tech calendar kicks into high gear, March 2024 stands out as the ultimate month for hackathons, and there’s no better event to mark your calendar for than AceHack 4.0, happening in Jaipur. But what makes March the perfect time to dive into the...technology
Aditya Tripathilearnedtech.hashnode.dev·5 hours agoGANs vs. Other AI Models: What Makes Them Unique?Artificial intelligence has been at the forefront of technological advancements, transforming industries and redefining possibilities. While a significant chunk of AI models focus on prediction, classification, or reinforcement learning, GANs create ...#cybersecurity
REHAN SAYYEDdignitas.hashnode.dev·21 hours agoActiveIP: 10.129.40.252 Let’s start with the nmap scan nmap -sC -sV -o nmap 10.129.40.252 Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-07 12:40 EST Nmap scan report for 10.129.40.252 Host is up (0.27s latency). Not shown: 983 closed tcp ports (reset...10 likesHackTheBoxhacking
CodeCraftGurupoliticopulse.hashnode.dev·21 hours agoWhat can we do to get more women into coding?The UK is facing a severe shortage of workers with digital skills, such as computer coders, cybersecurity experts, and data analysts. These roles are in high demand. This issue isn't limited to the UK. Globally, two-thirds of technology firms are str...10 likescoding
REHAN SAYYEDdignitas.hashnode.dev·Feb 7, 2025BusquedaIP: 10.129.228.217 Let's start with the Nmap scan. nmap -sC -sV -o nmap 10.129.228.217 Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-06 11:38 EST Nmap scan report for 10.129.228.217 Host is up (0.35s latency). Not shown: 998 closed tcp ports (r...10 likesHackTheBoxhacking
JENISH PAGHADALffuf.hashnode.dev·a day agoParameter FuzzingParameter fuzzing is the process of discovering hidden, undocumented, or vulnerable parameters in web applications by sending a large number of test requests. It is an essential technique in web application security testing, bug bounty hunting, and p...Web Development
JENISH PAGHADALffuf.hashnode.dev·a day agoDomain FuzzingSub-domain Fuzzing A sub-domain is a website that is part of another domain. For example, https://photos.google.com is the photos sub-domain of google.com. Here, we are checking different websites to see if they exist by looking for a public DNS reco...Web Development
JENISH PAGHADALffuf.hashnode.dev·a day agoBasic FuzzingDirectory Fuzzing As we can see from the example above, the main two options are -w for wordlists and -u for the URL. We can assign a wordlist to a keyword to refer to it where we want to fuzz. For example, we can pick our wordlist and assign the key...#cybersecurity
jannitech-for-newbies.hashnode.dev·Feb 6, 2025SSH for Beginners: What It Is and How to Use It"Understanding SSH Keys: How They Work and Why You Should Use Them" This aligns with the content of your blog by diving deeper into SSH key authentication, making logins more secure and convenient. 🚀 What Is SSH? Imagine you have a computer at home,...10 likesssh-keys