LATEST ARTICLES
Different types of hackers, from black hat to red hat
Hacker word comes from the word hacking which means to get access to a computer or system unauthorizedly. Hacker the word itself is very...
Know about Encryption & Cryptography
Once upon a time, keeping data to be secret was not hard, but to keep them secret, you had to write them down and...
NETWORK ATTACKS BASICS
NETWORK ATTACKS
A network attack is an attempt to gain unauthorized access to an organization's network, with the objective of stealing data or perform other...
Authentication and Authorization
Authentication
Authentication is the process by which people prove themselves who they are, say they are. It means that the system is verifying whether you...
BASTION HOST & HONEYPOT
BASTION HOST & HONEYPOT
A Bastion Host (also called Bastion Server) is a
special purpose computer that is present in the network to withstand attacks.
It...