PinnedSametWhat Actually Is Zero Trust Security?As can be understood from the supply chain attack incidents in the recent past and making a global impact, it is now necessary to take much…Jun 14, 2022Jun 14, 2022
SametWhat Is the difference between a threat, a vulnerability, and a risk?A threat exploits a vulnerability and can damage or destroy an asset. Vulnerability refers to a weakness in your hardware, software, or…Aug 21, 2022Aug 21, 2022
SametWhat is Wireshark and why is it used?Wireshark is a network protocol analyzer or application that captures packets from your computer to your home office or from a network…Aug 18, 2022Aug 18, 2022
SametWHAT IS SHODAN?Shodan is a search engine where you can passively gather information by searching for internet-connected devices. The difference from…Aug 16, 2022Aug 16, 2022
SametWhat do you mean by Cybersecurity?Cybersecurity is the protection of critical systems and sensitive information from digital security threats. The field of cybersecurity…Aug 16, 2022Aug 16, 2022
SametThe Most Important Vulnerability & Exploit Database Siteshttps://www.exploit-db.com/Aug 11, 2022Aug 11, 2022
SametTypes of MalwareCybercriminals use many different types of malicious software, or malware, to carry out their activities. Malware is any code that can be…Aug 10, 2022Aug 10, 2022
SametWhat layers does the OSI model consist of?Application Layer: Responsible for providing network services to users and their interaction with software applications. FTP, SSH, HTTP…Aug 9, 2022Aug 9, 2022
SametWhat is Virus Total?VirusTotal is an online service designed to analyze suspicious files and suspicious sites to quickly detect viruses and other types of…Jun 15, 2022Jun 15, 2022