Sahil Chandravanshisahilchandravanshi.hashnode.net·Dec 24, 2022Who is a hacker? Types of hackerWhat is hacking? Hacking refers to practices of trying to hack digital devices, such as computers smartphones tablets and even whole networks. And while hacking may not always be for malicious reasons, nowadays most hacking references and hacke...Stan and 2 others are discussing this3 people are discussing thisDiscuss·44 likes·380 readscyber securityI learned some new terms, and it was a good blogpost. ❤️ 13
Nouman Rahmanprogrammingfire.hashnode.net·Nov 5, 2022A Beginner-Friendly Introduction To Cyber SecurityCyber Security is a fascinating field of computer science that is growing more important every day. As our lives become increasingly dependent on technology, the need for people who can protect our data and systems from attack becomes more urgent. In...Discuss·21 likes·1.2K readscyber security
Nouman Rahmanprogrammingfire.hashnode.net·Oct 14, 2022picoCTF 2022: Cryptography: basic-mod1Introduction Challenge: basic-mod1 Category: Cryptography Description: We found this weird message being passed around on the servers, we think we have a working decryption scheme. Download the message here. Take each number mod 37 and map it to the ...Discuss·10 likes·640 readspicoCTF 2022Cryptography
Joshua Crawfordjoshuacrawford.hashnode.net·Apr 17, 2023My First Cyber Security ConferenceLead-Up I've always loved the idea of Cyber Security since I was young and through my research months ago, I learned one primary thing: immersion was key. A few months ago I decided to get serious about creating and pursuing the career I want. Being ...DiscussCyberSec
AMAN KUMAR YADAVakyhub.hashnode.net·Apr 1, 2023#hacking-categoriesCategories of Hacking: Understanding the Different Types Hacking, the act of exploiting a system or network for malicious purposes, is an increasingly common threat to individuals, businesses, and governments worldwide. Hackers use a variety of techn...Discusscyber security
Aman Yadavitsamanyadav.hashnode.net·Mar 5, 2023Introduction to Cyber Sec for Beginners 2023Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption o...Discuss·129 readsDevsInTechBlogs
Discovery Enginecloudsecurityusa.hashnode.net·Feb 24, 2023Why is Cloud Security ImportantCloud Security to Protect Data In today’s digital world, cloud security is essential to protect data from malicious actors online. It involves a set of policies, controls and technologies aimed at protecting sensitive data stored on the cloud from un...Discusscloud security
Mejbaur Bahar Fagunfagun.hashnode.net·Feb 9, 2023Online Safety 101: How to Avoid Hacking and Protect Your DataIn today’s digital age, the internet has become an essential part of our daily lives. We use it for work, entertainment, communication, and many other purposes. However, as we rely more on technology, the threat of hacking and online security breache...Discuss·10 likes·26 readsCyber Security & Ethical Hackinghacking
Mohamed Abdalla Ibrahimx0.hashnode.net·Jan 29, 2023Keeping Your Azure Cloud Safe: Best Practices for Securing Resources (1 .MFA)As more and more businesses move to the cloud, the need for robust security measures becomes increasingly important. Azure is a powerful cloud platform that offers a wide range of resources and services, but it also requires a thorough understanding ...Discuss·67 readsAzure Azure
WarrenMuforOpen Source Community Kampalaoscakampala-1654018717715.hashnode.net·Jan 26, 2023Security engineering basing on gracenolan notes. part 1Networking what is computer networking? Computer networking is the practice of linking computer devices together to facilitate communication and the sharing of resources. This can be done through wired or wireless connections and can be accomplished...Discuss·83 reads#cybersecurity
Sajith Kiamsajithk.hashnode.net·Jan 22, 2023The evolution of cybersecurity and the challenges companies will face in protecting their dataCybersecurity has come a long way since the early days of the internet. In the past, the primary concern was protecting against simple hacking attempts and viruses. However, as technology has advanced and the amount of data being stored and shared on...Discusscyber security
Nebulanebula-blogs.hashnode.net·Jan 21, 2023My pentesting journey so far ...I wanted to share my journey into the cybersecurity industry today to explain why I still work in it (despite writing about the high rate of burnout among cybersecurity professionals). It roughly started during high school (about 8 years ago) when I ...Discuss·56 readsinfosec
Aby_x0X0secguy.hashnode.net·Jan 14, 2023So you like Public WiFi?Don't want to use up your limited mobile data? Why not use unlimited public WiFi? a boon for us, the "always-online" generation. Unlimited data connections are available in public places such as cafes, libraries, airports, and parks. With that much e...Discusscyber security