Product Manager with a strong tech background and a flair for Marketing. Guest writer for FreeCodeCamp and The Startup. Learn more at www.manishmshiva.com

Social engineering is the technique by which an attacker can make a person do something that is not usually in their best interest. In this article, we will look at a few common ways Social Engineers try to manipulate you.

Image for post
Image for post

Disclaimer: My articles are purely educational. If you read them and cause damage to someone, that's on you. I don't encourage any malicious activity or black hat practices. Read the code of ethics here.

Remember the Nigerian scammers sending you emails about the rich prince that needs your help? All you had to do was transfer a thousand dollars in exchange for a multi-million dollar fortune.

There are similar scams that have circulated the internet: The IRS scam, Lottery scams, and so on. These are broadly classified as the Advance offer scams. …


Numpy is a python library for performing large scale numerical computations. It is extremely useful, especially in machine learning. Let's look at what Numpy has to offer.

Image for post
Image for post

Introduction

NumPy is a Python library used to perform numerical computations with large datasets. Numpy stands for Numerical Python and it is a popular library used by data scientists, especially for machine learning problems. NumPy is useful during pre-processing the data before you train it using a machine learning algorithm.

Working with n-dimensional arrays is easier in Numpy compared to Python lists. Numpy arrays are also faster than Python lists since unlike lists, NumPy arrays are stored at one continuous place in memory. This enables the processor to perform computations efficiently with NumPy arrays.

In this article, we will look at the basics of working with Numpy including array operations, matrix transformations, generating random values, and so on. …


Hope you had a great weekend. Here are the stories from last week.

Have a great week :)

Cheers,
Manish
Find me at https://www.linkedin.com/in/manishmshiva


Aircrack comprises of a suite of tools that help you attack as well as defend wireless networks. Let's look at what Aircrack has to offer.

Image for post
Image for post

Imagine a world without wifi. We would still be using long wires of ethernet cables to connect to the internet.

There is no debate on how much WiFi has made our lives easier. Now we can connect to the internet on coffee shops, subway stations and almost anywhere we go.

However, WiFi is also a vulnerable network compared to the ethernet. Unless it is properly secured, it's easy to perform man-in-the-middle attacks using tools like Wireshark.

For example, if you are connected to a Starbucks network, anyone connected to that network can look at every other person’s network traffic. Unless you use a VPN or the website uses https, your data (including passwords and credit card details) will be visible to the entire network. …


Hope you had a great weekend. Here are the stories from last week.

Have a great week :)

Cheers,
Manish Shivanandhan
Find me at https://www.linkedin.com/in/manishmshiva


Cybersecurity has its fair share of jargon. This article will help you understand some of the common terms you will come across as a security engineer.

Image for post
Image for post
Photo by Nahel Abdul Hadi on Unsplash
  1. Authentication — The process of checking if a user is allowed to gain access to a system. eg. Login forms with username and password.
  2. Authorization — Checking if the authenticated user has access to perform an action. eg. user, admin, super admin roles.
  3. Audit — Conduct a complete inspection of an organization’s network to find vulnerable endpoints or malicious software.
  4. Access Control List — A list that contains users and their level of access to a system.
  5. Aircrack-ng — Wifi penetration testing software suite. Contains sniffing, password cracking, and general wireless attacking tools.
  6. Backdoor — A piece of code that lets hackers get into the system easily after it has been compromised. …


Penetration testing is the process of exploiting an organization’s network to help defend it better. Here are five steps involved in a successful penetration test.

Image for post
Image for post

Before we get into the article, I would like to emphasize that I am not responsible for any damage you do trying to attack systems. Its illegal. You should have written permission before you even try to scan a system or a network.

Cybersecurity is one of the hottest fields to be in, thanks to companies going remote. Cyber threats are increasing and cybercriminals are finding new ways to exploit systems.

Penetration testing is how the good guys work. They think like hackers and attack their own systems. …


Advertising is failing, thanks to Adblockers. Here’s how you can sell successfully to an audience without trying to shove an ad down their throat.

Image for post
Image for post
Photo by Jo San Diego on Unsplash

THE PROBLEM

Advertising is hard. If you are a marketer, I don’t have to tell you that. You probably learned it from your last Facebook / Google ad campaign.

Businesses buy billions of dollars of advertising every year to promote their products. Compared to the age of Television, you can measure your returns.

But what’s the point?

On average, display advertising gets less than 30% engagement.

To be clear, I am not telling you not to run ads on Facebook or Google. There are businesses that are wildly successful using paid advertising. I am just saying it's not going to last.

Look at Adblockers. Content creators have been panicking with the rise of adblocker usage in both web and mobile platforms. …


Intelligent IoT devices are all around us. In this article, we will see how you can combine machine learning and embedded systems to build intelligent IoT devices.

Image for post
Image for post

If you are new to machine learning, it is a technique of using algorithms to analyze massive amounts of data to draw conclusions. Deep learning is a branch of machine learning that uses an algorithm called neural networks.

When you combine large data sets with high computing power, these neural networks can understand patterns between data.

Deep learning has given rise to self-driving cars, personal assistants like Siri, and many others. Engineers are adopting deep learning models into their applications to solve complex problems for their customers.

Tensorflow is a leading Deep learning library developed by Google. It supports a variety of neural network models like Convolutional and Recurrent Neural Networks. …


Metasploit can handle everything from scanning to exploitation. In this article, we will take a look at what makes Metasploit the most versatile penetration testing toolkit.

Image for post
Image for post

Intro to Penetration Testing

If you are new to penetration testing, let me explain what it is before I introduce you to an exploitation tool.

Penetration testing is hacking with permission. You might have seen cool hackers on TV attacking computer systems without getting caught. But that’s not how it works in the real world.

If you hack someone without permission, there is a high chance that you will end up in jail. So if you are planning to learn hacking with evil intentions, I am not responsible for any damage you cause. All my articles are purely educational.

So, if hacking is bad, why learn it in the first place? Every device on the internet is vulnerable by default unless someone secures it. …

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store