CALL US

+91 9116117170

Category: Linux

Overview of Linux File System : Definition, Structure

By Chandan Singh 0 Comment October 5, 2016

Linux has been designed right from the start to be multi user and multi task system. In Linux there is just one file system. Media devices like the hard drive, storage or disc and CD-Rom and UNIVERSAL SERIAL BUS(USB) are all mounted collectively in a single directory site or listing structure (e. g. Hard disk […]

How to install Nmap on Linux & Windows

By Chandan Singh 0 Comment September 10, 2016

What is Nmap Nmap is stands for Network Mapper, which is open source, used for find network and auditing for security. Network administrator are used for monitoring host or service up time, network inventory, managing service and upgrade networking schedules. Nmap also use raw IP packets are many ways to identify which hosts are available […]

What is MITM (Men-In-The-Middle-Attack)

By Chandan Singh 1 Comment August 29, 2016

Overview A man-in-the-middle attack is a kind of cyber-attack where attacker inserts him/her into a conversation between two parties, try to impress both sides and gains access to information that both parties are trying to send to each other. A man-in-the-middle attack allows a malicious attacker to interception between sender and receiver sides. Attacker can send […]

What is SQL Injection?

By Chandan Singh 0 Comment August 22, 2016

Introduction of SQL SQL stands for Structured Query Language. It is used to exchange information with Database like create/update/delete. Standard Language for Relational Database Management System according to ANSI (American National Standards Institute). Used to perform task with database like create/delete/update/rename database and tables. In a database data is stored in table (Rows and Columns) form. Introduction […]

What is Cross Site Scripting (XSS)?

By Chandan Singh 0 Comment August 20, 2016

About Cross Site Scripting (XSS) It’s a very common vulnerability found in Web Applications, ‘XSS’ allows the attacker to insert malicious code, generally there are many types of XSS attacks, I will mention 3 widely used XSS that allows an attacker to inject some malicious code into the applications damaged as a way to bypass access to the […]

error: Content is protected by Cyberops !!