DHAIRYA PATELdhairya1403.hashnode.dev·Apr 20, 2024Basic Security Practices for Web DevelopersWe are living in an Information Era or the Digital Age. Major part of things happening around us are based on transmitting, accessing and manipulating information. Websites play a very large crucial role, serving as a foundational platform in sharing...Discusssecurityawareness
Jay Tillublogs.jaytillu.in·Apr 16, 2024How AWS Shield Protects You From DDoS?The threat of cyber attacks is large in today's interconnected digital world, where businesses and individuals rely heavily on online services. One such threat that has gained fame in recent years is the Distributed Denial of Service (DDoS) attack. I...DiscussAWSAWS
Prajoti Raneprajotirane.hashnode.dev·Apr 6, 2024Target Data Breach: A Case Study in Cybersecurity Failures and Lessons LearnedIn the annals of cybersecurity breaches, few incidents have had the lasting impact and repercussions as the Target data breach of 2013. This watershed moment not only exposed the vulnerabilities of one of America's largest retailers but also served a...DiscussTarget data breach, cybersecurity failures, cyber attack timeline, technical details of breach, breach mitigation strategies, security measures, lessons learned from breach
Th@n#170thanhlam-attt.hashnode.dev·Mar 26, 2024Attack Techniques on Email AuthenticationBasic concepts TXT record **A TXT record** in DNS is a type of record used to store custom text information related to specific domain nam. TXT record are commonly used to store information such as authentication information, authorship indentificat...DiscussSecurity
Oladipo Evangeloladipoevangel.hashnode.dev·Mar 23, 2024Understanding Reentrancy in smart contractsWhat is reentrancy vulnerability? This is a common vulnerability in smart contracts where contracts can be exploited by making a function repeatedly perform an action without updating or making the required state changes. Imagine being able to withdr...Discuss·79 readsSolidity secur
Jay Tillublogs.jaytillu.in·Mar 21, 2024What are Subnets in Networking?Have you ever felt overwhelmed by the sheer number of people in your apartment building? Imagine if everyone tried to use the same elevator or squeeze into the laundry room at once. Networks can face a similar challenge, especially large ones. That's...DiscussNetworkingsubnet
Jay Tillublogs.jaytillu.in·Mar 19, 2024What is Security Zones in Networking?In networking, security zones refer to segregated areas within a network that have specific security policies and controls applied to them based on the level of risk and sensitivity of the resources they contain. Security zones are a fundamental aspe...DiscussNetworkingcyber security
Jay Tillublogs.jaytillu.in·Mar 18, 2024What is a Firewall in Networking?A firewall is a security system that acts as a gatekeeper for your computer network. It monitors incoming and outgoing traffic based on a set of rules, deciding whether to allow or block specific data packets. In essence, it creates a barrier between...DiscussNetworking#cybersecurity
Jay Tillublogs.jaytillu.in·Mar 15, 2024Difference between POP, IMAP and SMTPEver wondered how your email magically appears on your phone, computer, or tablet? The answer lies in a trio of hardworking protocols: POP (Post Office Protocol), IMAP (Internet Message Access Protocol), and SMTP (Simple Mail Transfer Protocol). Each...DiscussNetworking#cybersecurity
Jay Tillublogs.jaytillu.in·Mar 15, 2024What is SMTP in Networking?SMTP, or Simple Mail Transfer Protocol, is the standard protocol used for sending email messages across networks. SMTP isn't directly involved with how you view or manage your emails. Instead, it acts as the communication channel between email client...DiscussNetworkingSecurity