Techie Talks
-
Security+
Commonly Exploited Services
Commonly Exploited Services: The Windows OS is popular with both users and attackers for various reasons, but for now let’s…
Read More » -
Security+
Services and Ports of Interest
Services and Ports of Interest: As we wade into the enumeration phase, let’s make sure you understand more details about…
Read More » -
Black Hat
Location and Geography
Location and Geography: Not to be overlooked or underestimated in value is any information pertaining to the physical location of…
Read More » -
CEH Course
Download Complete Python Bootcamp: Go From Zero To Hero in Python 3
COMPLETE PYTHON BOOTCAMP: Learn Python Now! Start from the very basics and go from creating your very own applications and…
Read More » -
Web Hacking
Terminology in Footprinting
Terminology in Footprinting: In this section you will learn definitions that may appear on the CEH v10 (Certified Ethical Hacking)…
Read More » -
Web Hacking
Secure Sockets Layer
Secure Sockets Layer: Another important mechanism for securing information is Secure Sockets Layer (SSL). The SSL protocol was developed by…
Read More » -
Black Hat
Understanding the Steps of Ethical Hacking
Understanding the Steps of Ethical Hacking: For an overview of the process, let’s look at the steps of ethical hacking…
Read More » -
Black Hat
Hacking: Current Developments
Current Developments: In the early 2000s, more malicious activity started to appear in the form of more advanced attacks. In…
Read More » -
Security+
So, What is an Ethical Hacker?
What is an Ethical Hacker: When you explore this blog and the tools it has to offer, you are learning…
Read More » -
Web Hacking
Reporting a Security Incident
Reporting a Security Incident: Once an incident has been responded to and a team has gotten involved to assess the…
Read More »