PinnedNidhi Rohilla“Unleashing Chaos: The NotPetya Ransomware Attack Decoded”Destructive ransomware that paralyzed systems worldwide by encrypting the Master File Table (MFT) and spreading rapidly through networks.Apr 4Apr 4
PinnedNidhi RohillaLockBit Ransomware and Its EvolutionAnalyzing the Tactics, Targets, and Mitigation StrategiesFeb 27Feb 27
Nidhi RohillaStatic Analysis of code using SplintStatic code analysis with Splint in Ubuntu ensures software reliability by identifying programming errors. Here’s a guide on using Splint…May 20May 20
Nidhi RohillaHow to be Anonymous?Installing & Configuring TOR with Proxychains on Kali Linux and how to scan a website or server using proxychainsApr 13Apr 13
Nidhi RohillaEASIEST WAY TO SET UP HONEYPOT IN YOUR LINUX!!A guide to what is Honeypot and how to set it up in your Linux systemApr 6Apr 6
Nidhi Rohillacrux of Programming with abstract data typesResearch paper by- Barabara Liskov and Stephen ZillesMar 31Mar 31
Nidhi RohillainSystem WeaknessIdentification and Authentication Failures (A07:2021)“Authentication is not about making systems secure. It’s about choosing between different levels of insecurity.”Mar 12Mar 12
Nidhi RohillaNo Silver Bullet — Essence and Accident in Software EngineeringIt is a widely discussed paper on software enginnering written by Frederick P. Brooks, Jr. in 1986.Mar 5Mar 5
Nidhi RohillaWell Hy!! Dyk about Security Misconfiguration?Understanding and Preventing Security Misconfigurations(A05:2021)Mar 4Mar 4
Nidhi RohillaVulnerable and Outdated ComponentsPatching Panic? Here’s Your Guide to Securing Your Apps from Outdated and Vulnerable Components.(A06:2021)Mar 4Mar 4