Amanmadquickaman15.hashnode.dev·Oct 1, 2023How you can avoid being hacked?Get a Password Manager In today's digital age, passwords are the first line of defense against cyber threats. Gone are the days when simple passwords like "password" or "12345" were acceptable, even for the most insignificant accounts. As we navigate...DiscussHackers
Prajoti Raneprajotirane.hashnode.dev·Sep 1, 2023Combating Application Security Risks: A Thorough Overview to Application SecurityIn today's increasingly digital environment, apps are organizations' lifeblood. Everything from client interactions to internal operations is powered by them. However, enterprises have been exposed to a wide range of security dangers as a result of t...Discuss·2 likesApplication Security
Irwing Telloirwingtello.hashnode.dev·Aug 19, 2023Build a discord bot to protect against scammers and hackers in Web3 without writing codeOverview Imagine Web3 as a place similar to the Old West, where making even a small security mistake could put your funds at risk of an irreversible loss. For this purpose, I have created this guide for you. In it, you'll be able to shield your commu...Discuss·81 readsDiscord bot
Stackzerostackzero.hashnode.dev·Jul 24, 2023Cyber Kill Chain: How Hackers Target and Take Down OrganizationsThis article is an introduction to what is Cyber Kill Chain and how it works. Maybe if you follow some cybersecurity podcast, newsletter etc. you have heard about that, but did you know exactly what is it? Knowing what it is is mandatory for anyone w...Discuss#cybersecurity
Emmanuel Linuselexy101.hashnode.dev·Jun 24, 202310 Steps To Become A Hacker (An Ethical Hacker)Are you interested in becoming a hacker? Ethical hacking is a growing field with many opportunities. But how do you become an ethical hacker? In this blog post, we will explore 10 steps to take if you want to become a hacker. From learning how to cod...Discusshacking
Scofield Idehenforscofield.hashnode.dev·May 29, 2023Hackers Tools: Must-Have Tools for Every Ethical HackerIn the continually evolving world of web development, frameworks play an important role in automating the entire creation process, boosting productivity, and improving the general efficiency of online applications. Because there are a lot of choices,...Discuss#cybersecurity
Mr Ayush Sarodemrayush.hashnode.dev·Mar 28, 2023What is 'Hacking'Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose To better describe hacking, one needs ...Discuss·123 readshacking
Shital Mainalishitalmainali.com.np·Mar 6, 2023Bulletproof Your Database: How to Submit HTML Form Data to MySQL Using PHP While Safeguarding Against SQL Injection AttacksIntroduction Are you tired of hackers infiltrating your database like a thief in the night? Have you ever wished you could protect your sensitive information from malicious attacks and sleep soundly knowing your data is secure? Well, you're in luck b...Discuss·546 readsPHP MySQL Operation PHP
Sudip Senguptassengupta3.hashnode.dev·Feb 17, 2023How Hackers Steal Passwords And Methods To Stop Them?With a compromised password, it’s not just your account or information that remains vulnerable. Hackers typically steal passwords as the first leg of a larger attack; and build up to exploit your compromised account for accessing other systems or use...Discusspasswords
Ifeadigo Wisdom Nzekwemenovacity.hashnode.dev·Feb 12, 2023What A USB RUBBER DUCKY?The Rubber Ducky is a type of hardware device that is commonly used in the field of ethical hacking and penetration testing. It is a small USB drive that looks like a normal USB flash drive, but it is actually a highly sophisticated hacking tool. Her...Discuss·68 readsusb