Gaurav Chaudharypixelgig.pro·17 hours agoLearning Cyber Security For Programmers Day 3 — Essential Cybersecurity ToolsGreetings, security-conscious coders! We’ve delved into the dark side of cybersecurity, meeting the malicious actors and their tactics. Now, it’s time to build our arsenal! Today, we’ll explore some essential tools that every programmer-turned-cybers...DiscussCybersecurity Bootcamp: My Daily Grind to Expertiseprotect your code
chris tchassemchris21.hashnode.dev·Mar 24, 2024How to connect to SMB (Server Message Block) protocol anonymously (Capture The Flag)Set-up your environment First thing you always need to do to access a machine is to make sure you have the correct tools and components ready to enable you do that. I will be working with HTB (Hack The Bix) which is a platform that offers free and pa...Discuss#capturetheflag
Anjalipeachycloudsecurity.hashnode.dev·Mar 13, 2024Analyzing Latest WhatsApp Scam Leaking AWS S3 BucketThis is a quick blog about an amazon scam going on WhatsApp. In search of data, I found the S3 bucket which is publicly available. Since these scammers use victims’ data for personal use, I will be using their data for personal research. Let’s begin ...DiscussAWS s3
Swati Priyaswatiwriting.hashnode.dev·Mar 11, 2024What is Hacking? #Skilldarpan #Sevendayshacking #Cybersecurity Workshop day 1What is Hacking? Hacking is a term used to describe the act of gaining unauthorized access to computer systems, networks, or data, typically through exploiting vulnerabilities or weaknesses in security measures. It involves using technical skills and...Discuss#skilldarpan #sevendayhacking
Swati Priyaswatiwriting.hashnode.dev·Mar 11, 2024Networking #Skilldarpan #Sevendayshacking #CybersecurityworkshopExplain Networking. Networking refers to the practice of connecting computers, devices, or systems together to facilitate communication and resource sharing. In a networked environment, devices can exchange data and information, share resources such ...Discuss#skilldarpan #sevendayhacking
Nitish Kumar Paswanernitishpaswan.hashnode.dev·Mar 10, 2024Understanding Ethical Hacking: Safeguarding Systems in the Cyber Age.What is Ethical Hacking? A Cybersecurity Definition of Ethical Hackers In today's digital landscape, where technology is constantly advancing, the prevalence of cyber threats has become a reality. Cybercriminals continuously seek ways to exploit vuln...Discussethicalhacking
Bafedile Sebataneblog.blxckcicada.co.za·Mar 9, 2024Life Lessons from the Hacking WorldI've been exploring the world of cybersecurity and hacking for some time now. It's a vast field with different specializations just like any other tech-related area. Rather than delving into the technical aspects of hacking, I'd like to share what I'...Discuss·135 reads#cybersecurity
Neha Tyaginehaosint.hashnode.dev·Mar 6, 2024Why Linux used in cyber security?Cost-effective Open-source Security Compatibility Stability Community support Why should you learn how to use Linux? Linux is safer than the majority of current operating systems and here some points :- Strong Security Low Cost Great Termin...Discuss#cybersecurity
Audrey Evergreeneaudreyevergreene.hashnode.dev·Mar 4, 2024Being an Ethical Software EngineerEngineers Have Power As a Millennial junior software developer, I've been immersed in the world of technology without fully grasping the global impact. It's fascinating to think about how software, once viewed as an unavoidable neces...DiscussSoftware Engineering
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 4, 2024Linux Operating SystemWhat is Linux? Linux is a powerful and flexible family of operating systems that are free to use and share. It was created by a person named Linus Torvalds in 1991. What’s cool is that anyone can see how the system works because its source code is op...Discuss#skilldarpan #sevendayhacking