DLL Injection And Process Hollowing Detection in Pest Code Analysis
In forensic information examinations, computers that are thought to have been compromised by a malicious code sometimes come out, and we are expected to detect …
Knowledge pool for Information Technologies
In forensic information examinations, computers that are thought to have been compromised by a malicious code sometimes come out, and we are expected to detect …
You may have seen the IMEI code in your phone’s settings or box. So what exactly does this IMEI code come to you from time …
As you use smartphones, you need to know more about the risks that accompany them and take appropriate measures. Smartphones are powerful speakers and distributors …
Due to the fact that personal data belonging to previous phone owners are not completely cleared from the phone during the second-hand phone purchases made …
Let’s start by applying some tests on the target; Let’s scan the target network using Nmap. With IPs, we determined which ports are working on …
Information security is defined as the prevention of unauthorized or unauthorized access, use, alteration, disclosure, elimination, alteration and damage of information as a type of …
First of all, knowing what you understand and expect from the concept of “pentest” will help you in this process. Because this was afterwards by …
WAF (Web Application Firewall) helps protect the web application by filtering and monitoring HTTP traffic between a web application and the internet. It generally protects …
Why would a computer need 2 different IP addresses? It is not necessary for normal use, but it can be a very necessary situation in …
We have described Docker widely. It is a by-product of Docker Fig. Docker is a tool that allows managing the distribution of Linux applications running …