Friday 5 August 2022

Wireshark

What Is Wireshark?

Wireshark is a network protocol analyzer, or an application that captures packets from a network connection, such as from your computer to your home office or the internet. Packet is the name given to a discrete unit of data in a typical Ethernet network.read more

Wednesday 3 August 2022

Lynis

Lynis is an open-source security auditing tool for UNIX derivatives like Linux, Mac OS, BSD, other Unix-based operating systems, etc. Performing extensive health scans of systems that support System Hardening and Compliance Testing. An open-source software with GPL License. This tool scans for general system information, vulnerable software packages, and configuration issues. It is helpful for System Administrators, Auditors, and Security Professionals. read more


Tuesday 2 August 2022

Nmap

What is Nmap

Nmap, short for Network Mapper, is a free and open source tool used for vulnerability checking, port scanning, and network mapping. Despite being created in 1997, Nmap remains the gold standard against which all other similar tools, either commercial or open source, is judged. read more

Monday 1 August 2022

Hacktivism

 What is hacktivism?

Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists. Hacktivism is meant to call the public's attention to something the hacktivist believes is an important issue or cause, such as freedom of information, human rights, or a religious point of view. read more

Sunday 31 July 2022

Phreaker

Phreaking is a slang term for hacking into secure telecommunication networks. The term phreaking originally referred to exploring and exploiting the phone networks by mimicking dialing tones to trigger the automatic switches using whistles or custom blue boxes designed for that purpose.read more

Saturday 30 July 2022

Gray Hat Hacker

 A grey hat programmer (additionally spelled grey hat programmer) is somebody who might abuse moral norms or standards, however without the malignant purpose attributed to dark cap programmers.

Grey hat programmers might participate in rehearses that appear to be not exactly totally above board, yet are frequently working for the benefit of everyone. Grey hat programmers address the center ground between white cap programmers, who work for the benefit of those keeping up with secure frameworks, and dark cap programmers who act vindictively to abuse weaknesses in frameworks. more read

Friday 29 July 2022

Cracker vs Hacker

Computer cracker A computer cracker is an outdated term to describe someone who broke into computer systems, bypassed passwords or licenses in computer programs, or intentionally breached computer security. Computer crackers were motivated by malicious intent, for-profit, or just because the challenge was there.

read more

Google Launches GUAC Open Source Project to Secure Software Supply Chain

Google on Thursday announced that it's seeking contributors to a new open-source initiative called Graph for Understanding Artifact Comp...