Chidinma Ozoemenachidinmawrites.hashnode.dev·Sep 27, 2024Understanding IP Address and How to Secure It from HackersHey there! Last time, we talked about networking and its types, and today we're diving into a more specific topic—IP addresses. Let's explore what an IP address is and how you can secure it from hackers. What is an IP Address? An IP (Internet Protoco...iwritecode
MOHD NEHAL KHANnehalblogs.hashnode.dev·Sep 26, 2024Comprehensive Steps to Kick Off Global Hack WeekIn this blog, I will provide you with the step-by-step process to access, register and attend the GHW, before accessing and registering, it is important to know about GHW, Its Purpose, who conducted it and what benefits you will get from it. without ...4 likes·46 readsmlh
IRFAN ALI KHANirfanalikhan.hashnode.dev·Jul 22, 2024Preventing Balance Transfer Exploits: Resolving a Case-Insensitive Username Comparison After a Hacker AttemptIntroduction In web development, ensuring that users cannot perform unintended actions is crucial for maintaining the integrity and security of an application. Recently, I encountered a situation where users were able to transfer balance to their own...1 like#ServerSideValidation
Nipun Hegdecodecloudcapital.hashnode.dev·Jul 19, 2024What is OWASP Top 10: History, Importance, and Detailed AnalysisIntroduction In the ever-evolving landscape of web security, the OWASP (Open Web Application Security Project) Top 10 has become an essential resource for developers and security professionals. This list identifies the most critical security risks to...OWASP TOP 10
Abhay Porwalabhayporwals.hashnode.dev·Mar 9, 2024Linux DecodedOnce a person said, "Linux is not about choice, it's about freedom". Welcome to the world of Linux, where freedom meets functionality, and tech enthusiasts find their digital playground. If you're wondering why Linux is more than just an operating sy...linux for beginners
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 4, 2024Linux Operating SystemWhat is Linux? Linux is a powerful and flexible family of operating systems that are free to use and share. It was created by a person named Linus Torvalds in 1991. What’s cool is that anyone can see how the system works because its source code is op...#skilldarpan #sevendayhacking
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 4, 2024Client Server ArchitectureWhat is Client Server Architecture? The client-server architecture refers to a system that hosts, delivers, and manages most of the resources and services that the client requests. In this model, all requests and services are delivered over a network...#skilldarpan #sevendayhacking
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 4, 2024Ipconfig CommandWhat is IPCONFIG COMMAND? IPCONFIG is a System Service Tools (SST) Advanced Analysis command that allows viewing or altering IP configuration settings not available through the standard TCP/IP configuration menus. What are the Benefits of IPconfig? ...#ethi
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 4, 2024Traceroute CommandWhat is Traceroute Command ? A traceroute provides a map of how data on the internet travels from its source to its destination. When you connect with a website, the data you get must travel across multiple devices and networks along the way, particu...#skilldarpan #sevendayhacking
SHREE RAM BABUethical-hacking.hashnode.dev·Mar 1, 2024What is Ethical Hacking and Types of Hackers?What is ethical hacking ? Ethical hacking is an authorized attempt to access a computer system or an application and obtain data in an unauthorized way. Ethical hackers use the same techniques and strategies to access confidential information as othe...30 reads#skilldarpan #sevendayhacking