Category: Uncategorized

The Complete Guide of Computer Science and Information Technology to Crack any Examination

The Complete Guide of Computer Science and Information Technology to Crack any Examination ALL IN ONE COMPLETE GUIDE FOR  DRDO,  ISRO,   NASA,   BHEL,  SPACEX,  GOOGLE,  BSNL,  FACEBOOK, BARC, VSSC, CISR, ETC  AND  ALL OTHER COMPETITIVE  EXAMINATION WHICH IS BASED ON Computer Science and Information Technology

DRDO CEPTAM 09 COMPUTER SCIENCE EXAM PREPARATION TUTORIAL WITH FULL SYLLABUS

DRDO CEPTAM 09 COMPUTER SCIENCE EXAM PREPARATION TUTORIAL WITH FULL SYLLABUS PART ONE   DRDO ENTRY TEST : CEPTAM-09/STA-B Advt NETWORKING PROTOCOLS Networking Protocols include;- FTP=      File Transfer Protocol : port=21 SSH =      Secure Shell : port =22

Tagged with: , ,

What is Network Marketing and How does It Work Direct Selling and MLM

What is Network Marketing and How does It Work Direct Selling and MLM What is Network Marketing and How does It Work Direct Selling and MLM:-In  this  cyberpoint9 tutorial we are going to describe about the  concept of Network Marketing and How does

Tagged with: , , , , , , , , , , , , , , , , , , , , , , ,

Introduction to Penetration Testing

Introduction to Penetration Testing ———————————– Its a post info gathering phase in which we exploit the vulnerabilities discovered in the VA phase. WEB PT NETWORK PT MOBILE PT – Mobile SF Framework .apk .ipa Documentation : Digital Security Report Ethics

Introduction to System Hardening Basic Security Configuration

Session 17 ========== Introduction to System Hardening Basic Security Configuration Automated Security Analyzers – Lynis Basics Of Shell Scripting Introduction to System Hardening ================================ Hardening is usually a process of securing the system by reducing its surface of vulnerability. A

Introduction Of Honeypot

Session 16 =========== Introduction to IDS | IPS | Honeypots Network Security With Snort Log Analysis Honeypots and Attack Analysis UTM === UTM stands for Unified THreat Management Syste is a promising technology having Firewalls, Antiviruses, IDS, IPS, Web SEcurity,

Introduction to wireshark

WIRESHARK ========== Wireshark is a free application that allows you to capture and view the data traveling back and forth on your network, providing the ability to drill down and read the contents of each packet – filtered to meet

Joomla Content Management System

What Is a CMS? ================ A Content Mnagement System(CMS), is a system that allows you to manage information easily and effectively. The information could be anything, whether it’s a simple article or a complex media management system. It’s for non-technical

Conetent Managment System

G2 S13 ====== Content Management System ————————- For creating a whole new website, you just need to drag and drop the site’s element only. You do not need to have very awesome knowledge of HTML, JS, PHP and all…. So

INTRODUCTION TO NESSUS

INTRODUCTION TO NESSUS ====================== Nessus is one of the most popular and capable vulnerability scanners, it is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture regarding all the CVE’s , CWE’s , CVSS Scores and

Top
Show Buttons
Hide Buttons