Rithin LehanPhishing: Understanding the Threat and How to Prevent ItIn today’s digital age, phishing attacks have become a common way for cyber criminals to steal sensitive information from unsuspecting…Feb 9, 2023Feb 9, 2023
Rithin LehanLinux Funny CommandsLinux is fun! Huh. OK, so you don’t believe me. Mind me at the end of this article you will have to believe that Linux is actually a fun…Jan 27, 2023Jan 27, 2023
Rithin LehanNmapNmap (Network Mapper) is a free and open-source tool for network exploration and security auditing. It can be used to discover hosts and …Jan 24, 2023Jan 24, 2023
Rithin LehanEthical HackingEthical hacking, also known as white hat hacking, is the practice of using hacking techniques for the purpose of identifying and addressing…Jan 24, 2023Jan 24, 2023