Skip to content

Blog

The Blog

  • Home

AI Goals, Consciousness & Self-awareness : The Turing Test

sri Sep 9, 2023 AI, Consciousness, Universal Energy
Have you ever paused to contemplate the enigmatic nature of consciousness? It’s a topic that has captivated philosophers, scientists, and thinkers for centuries. Consciousness is

Read More »

Read More

Understanding the Principles of Metaphysical Leadership

sri Jun 10, 2023 Leadership
Leadership is a multifaceted concept that involves various principles and factors. In addition to traditional leadership theories, there are metaphysical and philosophical principles that can

Read More »

Read More

Root Cause Analysis

sri May 23, 2023 IT Security
Pre-RCA and Post-RCA refer to two different phases of the root cause analysis (RCA) process. Pre-RCA This phase involves activities and steps taken before conducting

Read More »

Read More

Network Protocol Structures : Numbering

sri Jan 25, 2023 IT Security, Networking
New protocols are being invented and applied rapidly. Basics remains the same at foundation levels. Good understanding of these intact numbering mechanisms are mandatory to

Read More »

Read More

Routing Network Traffic : For Traffic Capture

sri Jan 3, 2023 IT Security, Networking, Offensive Security, Pentesting, Unix/Linux
Routing Traffic IP is a routed protocol; that is, none of the nodes on the network need to know the exact location of any other

Read More »

Read More

Traffic Capturing

sri Nov 28, 2022 Uncategorized
Passive vs Active Capturing Passive capture doesn’t directly interact with the traffic. Instead, it extracts the data as it travels on the wire, which should

Read More »

Read More

What is IPS – Internet Protocol Suite?

sri Nov 28, 2022 IT Security, Networking
TCP/IP is the de facto protocol that modern networks use. Although you can think of TCP/IP as a single protocol, it’s actually a combination of

Read More »

Read More

What are Functions of Protocol?

sri Nov 28, 2022 IT Security, Networking
Maintaining session state Protocols typically implement mechanism to create new connections and terminate existing connections. Identifying nodes through addressing Data must be transmitted to the

Read More »

Read More

Tuning Up the Interface for Sniffing

sri Jun 16, 2020 IT Security, Networking, Unix/Linux
https://cromwell-intl.com/open-source/performance-tuning/ethernet.html

Read More »

Read More

Application Security – Missed Plots Redefined – BSIMM

sri Dec 21, 2019 IT Security, Networking, Software Engineering
How often we develop poorly but try to secure the application at the perimeter level? Is this even possible? Regardless of the whatever the methodologies

Read More »

Read More

Network Technologies and Tools

sri Sep 25, 2019 IT Security, Networking, Security+
Install and configure network components, both hardware and software-based, to support organizational security. Firewall / UTM NIDS / NIPS VPN Concentrator Firewalls Isolate one network

Read More »

Read More

Network Components

sri Sep 8, 2019 IT Security, Networking, Security+
Install and configure network components,both hardware and software-based, to support organizational security Router Switch Bridge Proxy Load Balancer Firewall NIDS / NIPS VPN Concentrator Wireless

Read More »

Read More
  • AI
  • Consciousness
  • Developing
  • Do It Yourself!
  • IT Security
  • Leadership
  • Networking
  • Offensive Security
  • Pentesting
  • Precautions
  • Riding Diaries
  • Security+
  • Software Engineering
  • System Designing
  • Testing
  • Uncategorized
  • Universal Energy
  • Unix/Linux

Amplification Application Attacks ARP Poisoning authentication header Bluejacking Clickjacking DDoS DNS poisoning Domain Hijacking DoS Dumpster Diving encryption Evil Twin Firewall Impersonation Initialization Vector(IV) Jamming MAC Spoofing Man in the middle Networking Phishing Privilege Escalation QA Replay Ride SriLanka Rogue AP SDLC Session Hijacking Software Development Software Documentation Software Engineering Software Testing Spear Phishing Switch Security Tailgating Test Plan Trojan Typo Squatting URL hijacking Virtual Lan Vishing Vlan Whaling Why To Document? Zones

  • Home
Blog
Proudly powered by WordPress.