Showing posts from December, 2022

HTML Enjection

HTML injection is a type of security vulnerability that occurs when a malicious party is able to …

What is Phishing Attack?

Phishing is a type of cyber attack that involves tricking people into disclosing sensitive inform…

Why Is Web-based E-mail So Popular?

The best explanation for the popularity of Web-based e-mail is that it is so easy to use. For exa…

IP Security Architecture

IP security architecture is an important component of any secure network. It is a framework that …

What is SSL?

Secure Sockets Layer (SSL) is a crucial technology for protecting data as it is transmitted acros…

Digital signature ?

Digital signature technology is revolutionizing the way we exchange documents and complete transa…

What is IDS?

Intrusion Detection Systems (IDS) are a critical component of any organization's security inf…

Data Security?

A key data security technology measure is scrambling, where digital data,  software/hardware, and…

What ls Chatting?

Chat is a text-based communication that is live or in real-time. For example, when talking to …

Search Engine?

A search engine is a software program or script available through the Internet that searches doc…

Who Use Proxy & Types Of Proxy?

Cyber criminals will aim to hide their IP public address – the one that can identify them on …

WHAT IS A VPN & TYPES OF VPN ??

VPN VPNs (acronym of Virtual Private Network) are encrypted “tunnels” acting like an intermedia…

Lenux Terminal Besic Commands

$ ls          :- (In order to know which files and directories are contained in the path we are…

What is Social Engineering?

Social engineering is a method of gaining access to systems, data, or buildingst hrough the explo…

That is All