Blogs
Stop Saying to use a long password now!!!
Stop Saying to use a long password now!!! You really can’t remember that many and long passwords now. Let’s take what is ideal; ideally, we would have a password manager, but it becomes hard to convince the user to take such a drastic step from an end-user point of view. Changing user behaviour is not
Tricking the attacker while storing logs securely
Tricking the attacker while storing logs securely https://youtu.be/pbSQvdBsoP4 Its all about being smart and using the concept of defense in depth In this video I talk about – The Three Stages of logging using syslog – Why Three Stages. – Securing the logs
Why the Total Cost of Ownership is not equal to the cost of the equipment
Why the Total Cost of Ownership is not equal to the cost of the equipment Many people who start in cybersecurity think that adding a solution would fix the problem. That is not always true. For example, you are the CTO of an organisation, and the CEO comes and ask you how vulnerable we are
STOPPING EVIL BOTS FROM ATTACKING SERVERS!!
STOPPING EVIL BOTS FROM ATTACKING SERVERS!! https://youtu.be/VYgMXBrVAL8 Here is a method by which you can stop a good amount of scans from happening on your web server.I will not be able to tell you how much but I can tell you to a certain degree since every architecture is unique.
What is a blackhole in networking?
What is a blackhole in networking? Let’s break things down and make it simple what is a black hole? A black hole is a region of spacetime where gravity is so strong that nothing exists. That is what I understood from reading Wikipedia but in networking, what is a black hole and where is it
ADS in NTFS | Hiding malicious code within files.
ADS in NTFS | Hiding malicious code within files. ADS (Active data stream) is a way you can store data about a file without Windows to see it usually. ADS is a feature of the Windows New Technology File System (NTFS) that, surprisingly, has both good and bad aspects. Alternate Data Stream is a little-known