Techie Talks
-
Security+
Understanding Hashing
Understanding Hashing: Simply yet, hashing can be considered a type of one-way encryption. More accurately, it is a process that…
Read More » -
Security News
“Zip Slip” A Critical Vulnerability Exploited in Zip
Zip Vulnerability: A critical vulnerability has been discovered by the security researchers which are impacting many open source coding libraries.…
Read More » -
Security+
Cross Site Scripting
Cross-Site Scripting (XSS) is a type of attack that can occur in many forms, but in general they occur when…
Read More » -
Security News
MyHeritage Breach Leaks Million of Account Details
MyHeritage Data Breach over 92 Million Users Data Leaked: Over 92 million account details from the Genealogy and DNA Testing…
Read More » -
Security+
File Systems
File Systems: Several filesystems are involved in the operating systems, and from a network perspective, they have a high level…
Read More » -
Ethics Law
Contents of a Contract – PTES
Contents of a Contract Penetration Testing: When the initial meeting is conducted, a contract will be generated outlining the objectives…
Read More » -
Security+
Monitoring System Logs
Monitoring System Logs: In addition to network monitoring, you must monitor the event logs. Event Logs are system logs that…
Read More » -
Notes
Types of Hardware Tools
Hardware Tools: So which hardware-based tools should you become fluent with or concentrate on when testing or training? Becoming familiar…
Read More » -
Security+
Application Security
The Application Security: There are a number of issues to be cognizant of when it comes to application security. Many…
Read More »