Open in app

Sign in

Write

Sign in

Shahidul Islam
Shahidul Islam

450 Followers

Home

About

Pinned

“Understanding and Protecting Against Distributed Denial of Service (DDoS) Attacks”

A DDoS (Distributed Denial of Service) attack is a type of cyber attack in which a large number of compromised systems, such as computers or IoT devices, are used to flood a targeted website or server with traffic, causing it to become unavailable to legitimate users. …

Malware

1 min read

“Understanding and Protecting Against Distributed Denial of Service (DDoS) Attacks”
“Understanding and Protecting Against Distributed Denial of Service (DDoS) Attacks”
Malware

1 min read


Pinned

What is File Upload Vulnerability? What are its effects?

What is File Upload Vulnerability? File Upload Vulnerability is when a web server allows users to upload files to its file system without adequately verifying their name, type, content, or size. If this file upload cannot be properly restricted, anyone can upload any type of file to the website by tampering with the file-upload variability…

Lfi

2 min read

What is File Upload Vulnerability? What are its effects?
What is File Upload Vulnerability? What are its effects?
Lfi

2 min read


Pinned

What is a backdoor? How Hackers Intrude WordPress Website Dashboards Through Backdoor?

What is a backdoor? Hackers infiltrate a system using backdoors. Simply put, a backdoor is an unprotected path through which someone enters a protected system. It could be a weak password, wrong configuration, etc. A system’s weak authentication mechanism also falls into the category of a backdoor. …

Wordpress Security

1 min read

What is a backdoor? How Hackers Intrude WordPress Website Dashboards Through Backdoor?
What is a backdoor? How Hackers Intrude WordPress Website Dashboards Through Backdoor?
Wordpress Security

1 min read


Pinned

DDOS Ping ICMP Flood & DDOS SYN Flood Attack

What are DDoS (DIDs)? Distributed Denial of Service or Deeds is an attack on the same target using multiple devices. Where a DOS attack is done using a single system or a single hacker, a DOS attack uses multiple devices or a few hackers working together. Suppose you have a business…

Wordpress Security

2 min read

DDOS Ping ICMP Flood & DDOS SYN Flood Attack
DDOS Ping ICMP Flood & DDOS SYN Flood Attack
Wordpress Security

2 min read


Pinned

What is Figma? Why is Figma a popular design tool?

Figma is a design tool that allows you to create designs for mobile and web interfaces or any other type of design you can think of. Figma is a collaboration tool for teams and individuals to create and share high-quality work. You can use it not only for design but…

Website Design

4 min read

What is Figma? Why is Figma a popular design tool?
What is Figma? Why is Figma a popular design tool?
Website Design

4 min read


Jul 14

“Distinguishing Between Cybersecurity and Information Security: Exploring the Key Differences”

Cybersecurity and information security are related but distinct concepts. While they both involve protecting information and systems from unauthorized access, use, disclosure, disruption, or destruction, there are some nuances in their focus and scope: 1. Information Security: Information security refers to the practice of protecting information and data from unauthorized…

Cybersecurity

2 min read

“Distinguishing Between Cybersecurity and Information Security: Exploring the Key Differences”
“Distinguishing Between Cybersecurity and Information Security: Exploring the Key Differences”
Cybersecurity

2 min read


Mar 29

7 Essential Tips for Securing Your PC Laptop from Cyber Attacks

In today’s digital age, cybersecurity has become a critical concern for individuals and businesses alike. Cyber attacks can take many forms, from viruses and malware to phishing scams and ransomware. These attacks can cause significant financial and reputational damage, and can even lead to identity theft or other serious consequences…

Information Security

4 min read

7 Essential Tips for Securing Your PC Laptop from Cyber Attacks
7 Essential Tips for Securing Your PC Laptop from Cyber Attacks
Information Security

4 min read


Mar 24

The Business Owner’s Guide to Securing a WordPress Website: Importance of Vulnerability Testing and Malware Clean-up

WordPress is one of the most popular content management systems used by businesses to manage their websites. However, the popularity of WordPress also makes it a target for cybercriminals. Hackers can exploit vulnerabilities in WordPress to gain unauthorized access to sensitive data or inject malware into websites. As a business…

Malware

3 min read

The Business Owner’s Guide to Securing a WordPress Website: Importance of Vulnerability Testing and…
The Business Owner’s Guide to Securing a WordPress Website: Importance of Vulnerability Testing and…
Malware

3 min read


Mar 21

Exploring Web Shells, Backdoors, and Ransomware: Understanding the Risks of Malware in Cybersecurity

In the world of cybersecurity, there are a variety of malicious tools that hackers can use to infiltrate systems, steal sensitive data, and wreak havoc. Three common types of malware that you may have heard of are web shells, backdoors, and ransomware. …

Malware

3 min read

Exploring Web Shells, Backdoors, and Ransomware: Understanding the Risks of Malware in…
Exploring Web Shells, Backdoors, and Ransomware: Understanding the Risks of Malware in…
Malware

3 min read


Mar 20

Top 5 Firewalls to Protect Your WordPress Website from DDoS Attacks

WordPress is the world’s most popular Content Management System (CMS), but its popularity also makes it a target for cyber attacks, including Distributed Denial of Service (DDoS) attacks. …

Firewall

2 min read

Top 5 Firewalls to Protect Your WordPress Website from DDoS Attacks
Top 5 Firewalls to Protect Your WordPress Website from DDoS Attacks
Firewall

2 min read

Shahidul Islam

Shahidul Islam

450 Followers

CyberSecurity Expert|Web Developer|PenTester

Following
  • Patrick OConnell

    Patrick OConnell

  • EddyevonAnonymous/DOM

    EddyevonAnonymous/DOM

  • Urfanito

    Urfanito

  • TJ. Podobnik, @dorkamotorka

    TJ. Podobnik, @dorkamotorka

  • KASATA

    KASATA

See all (3,870)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams