Disclaimer: My articles are purely educational. If you read them and cause damage to someone, that's on you. I don't encourage any malicious activity or black hat practices. Read the code of ethics here.
Remember the Nigerian scammers sending you emails about the rich prince that needs your help? All you had to do was transfer a thousand dollars in exchange for a multi-million dollar fortune.
There are similar scams that have circulated the internet: The IRS scam, Lottery scams, and so on. These are broadly classified as the Advance offer scams. …
NumPy is a Python library used to perform numerical computations with large datasets. Numpy stands for Numerical Python and it is a popular library used by data scientists, especially for machine learning problems. NumPy is useful during pre-processing the data before you train it using a machine learning algorithm.
Working with n-dimensional arrays is easier in Numpy compared to Python lists. Numpy arrays are also faster than Python lists since unlike lists, NumPy arrays are stored at one continuous place in memory. This enables the processor to perform computations efficiently with NumPy arrays.
In this article, we will look at…
Hope you had a great weekend. Here are the stories from last week.
Have a great week :)
Cheers,
Manish
Find me at https://www.linkedin.com/in/manishmshiva
Imagine a world without wifi. We would still be using long wires of ethernet cables to connect to the internet.
There is no debate on how much WiFi has made our lives easier. Now we can connect to the internet on coffee shops, subway stations and almost anywhere we go.
However, WiFi is also a vulnerable network compared to the ethernet. Unless it is properly secured, it's easy to perform man-in-the-middle attacks using tools like Wireshark.
For example, if you are connected to a Starbucks network, anyone connected to that network can look at every other person’s network traffic. Unless…
Hope you had a great weekend. Here are the stories from last week.
Have a great week :)
Cheers,
Manish Shivanandhan
Find me at https://www.linkedin.com/in/manishmshiva
Authentication is the process of checking if a user is allowed to gain access to a system. For example, login forms use a username and password to authenticate their users.
Another common form of authentication is social authentication through Google or Facebook.
Finally, there is Two-Factor Authentication (also known as 2FA) where you need more than one way of authenticating. Some of these methods include:
Authorization is the process of checking if the authenticated user has permission to perform an action.
For example, after logging into Facebook, you are authorized to…
Before we get into the article, I would like to emphasize that I am not responsible for any damage you do trying to attack systems. Its illegal. You should have written permission before you even try to scan a system or a network.
Cybersecurity is one of the hottest fields to be in, thanks to companies going remote. Cyber threats are increasing and cybercriminals are finding new ways to exploit systems.
Penetration testing is how the good guys work. They think like hackers and attack their own systems. …
Advertising is hard. If you are a marketer, I don’t have to tell you that. You probably learned it from your last Facebook / Google ad campaign.
Businesses buy billions of dollars of advertising every year to promote their products. Compared to the age of Television, you can measure your returns.
But what’s the point?
On average, display advertising gets less than 30% engagement.
To be clear, I am not telling you not to run ads on Facebook or Google. There are businesses that are wildly successful using paid advertising. I am just saying it's not going to last.
If you are new to machine learning, it is a technique of using algorithms to analyze massive amounts of data to draw conclusions. Deep learning is a branch of machine learning that uses an algorithm called neural networks.
When you combine large data sets with high computing power, these neural networks can understand patterns between data.
Deep learning has given rise to self-driving cars, personal assistants like Siri, and many others. Engineers are adopting deep learning models into their applications to solve complex problems for their customers.
Tensorflow is a leading Deep learning library developed by Google. It supports a…
If you are new to penetration testing, let me explain what it is before I introduce you to an exploitation tool.
Penetration testing is hacking with permission. You might have seen cool hackers on TV attacking computer systems without getting caught. But that’s not how it works in the real world.
If you hack someone without permission, there is a high chance that you will end up in jail. So if you are planning to learn hacking with evil intentions, I am not responsible for any damage you cause. All my articles are purely educational.
So, if hacking is bad…