AI Goals, Consciousness & Self-awareness : The Turing Test
Have you ever paused to contemplate the enigmatic nature of consciousness? It’s a topic that has captivated philosophers, scientists, and thinkers for centuries. Consciousness is
Understanding the Principles of Metaphysical Leadership
Leadership is a multifaceted concept that involves various principles and factors. In addition to traditional leadership theories, there are metaphysical and philosophical principles that can
Root Cause Analysis
Pre-RCA and Post-RCA refer to two different phases of the root cause analysis (RCA) process. Pre-RCA This phase involves activities and steps taken before conducting
Network Protocol Structures : Numbering
New protocols are being invented and applied rapidly. Basics remains the same at foundation levels. Good understanding of these intact numbering mechanisms are mandatory to
Routing Network Traffic : For Traffic Capture
Routing Traffic IP is a routed protocol; that is, none of the nodes on the network need to know the exact location of any other
Traffic Capturing
Passive vs Active Capturing Passive capture doesn’t directly interact with the traffic. Instead, it extracts the data as it travels on the wire, which should
What is IPS – Internet Protocol Suite?
TCP/IP is the de facto protocol that modern networks use. Although you can think of TCP/IP as a single protocol, it’s actually a combination of
What are Functions of Protocol?
Maintaining session state Protocols typically implement mechanism to create new connections and terminate existing connections. Identifying nodes through addressing Data must be transmitted to the
Tuning Up the Interface for Sniffing
https://cromwell-intl.com/open-source/performance-tuning/ethernet.html
Application Security – Missed Plots Redefined – BSIMM
How often we develop poorly but try to secure the application at the perimeter level? Is this even possible? Regardless of the whatever the methodologies
Network Technologies and Tools
Install and configure network components, both hardware and software-based, to support organizational security. Firewall / UTM NIDS / NIPS VPN Concentrator Firewalls Isolate one network
Network Components
Install and configure network components,both hardware and software-based, to support organizational security Router Switch Bridge Proxy Load Balancer Firewall NIDS / NIPS VPN Concentrator Wireless
- AI
- Consciousness
- Developing
- Do It Yourself!
- IT Security
- Leadership
- Networking
- Offensive Security
- Pentesting
- Precautions
- Riding Diaries
- Security+
- Software Engineering
- System Designing
- Testing
- Uncategorized
- Universal Energy
- Unix/Linux
Amplification Application Attacks ARP Poisoning authentication header Bluejacking Clickjacking DDoS DNS poisoning Domain Hijacking DoS Dumpster Diving encryption Evil Twin Firewall Impersonation Initialization Vector(IV) Jamming MAC Spoofing Man in the middle Networking Phishing Privilege Escalation QA Replay Ride SriLanka Rogue AP SDLC Session Hijacking Software Development Software Documentation Software Engineering Software Testing Spear Phishing Switch Security Tailgating Test Plan Trojan Typo Squatting URL hijacking Virtual Lan Vishing Vlan Whaling Why To Document? Zones