What is Information Security? How to Ensure Data Security?
Information security is defined as the prevention of unauthorized or unauthorized access, use, alteration, disclosure, elimination, alteration and damage of information as a type of …
Knowledge pool for Information Technologies
Information security is defined as the prevention of unauthorized or unauthorized access, use, alteration, disclosure, elimination, alteration and damage of information as a type of …
First of all, knowing what you understand and expect from the concept of “pentest” will help you in this process. Because this was afterwards by …
WAF (Web Application Firewall) helps protect the web application by filtering and monitoring HTTP traffic between a web application and the internet. It generally protects …
Sysmon (System Monitor) is one of its tools to monitor activities on Windows operating systems in detail. It provides detailed information on the created processes, …
We will explain the “uname” command that you can use on your Linux operating system. With this command, you can get the kernel information and …
In the current information technology environment, server, application and network devices are monitored by many monitoring applications. Although applications can monitor, monitoring and reporting of …
After using the weaknesses of a machine, exploiting that machine and buying a meterpreter shell, I will talk about the mimetic module and its use …
Before we start with Gophish, we will explain what Phishing is. What is Phishing? It is a type of online attack in which fraudsters send …
DEP (Data Execution Prevention) is a security feature that comes with Windows XP SP2. It prevents some unauthorized codes from running on certain memory sections …
Cross-Site Scripting (XSS) is a weakness that occurs if the developer does not pass the input from the user through the required HTML and JavaScript …