Tag: the basics
-
Quick checklist while you are developing any application for DevSecOps
DevOps is the thing that every organization is looking up to from the last half-decade and almost all tech giants are following that even there are startups which made millions providing solutions on DevOps but then what’s next? What’s next big thing after DevOps and then it comes DevSecOps. What is DevSecOps? DevSecOps is nothing…
-
Memory Segmentation In a Nutshell
Memory segmentation is a place where all the things happen while any program is running. Memory is divided into several segments and in this article, we are going to discuss them Usually compiled program memory is divided into 5 segments text data bss heap stack
-
What is UFS – Unix File System and ext Family
Knowing about Unix File System is important because it is the file system that is used by Linux distros and it is one of the most used kernels out there. XFS, JFS and many more file systems are like UFS so if you know about this file system you can cover other file systems based…
-
NTFS File System Basics and Structure
Even though FAT is one of the widely used file system it lacks many features. When Windows is about to launch Windows NT, which is sever based operating system they want to launch a new file system that can have capabilities that FAT doesn’t have.
-
Everything a Security Analyst need to know about FAT File System
For understanding disk-based forensics we need to know about each file system, how it works and what it’s made up of. In this article we will share you everything that we know, and you should know about FAT FAT stands for File Allocation Table. It is one of the most widely used file system…
-
Everything you need to know about File System Basics as a Forensic Analyst
What operating system do you use? Linux, Windows or Mac? Whatever the operating system you are using it doesn’t matter. You will be storing files in it. Every operating system uses their kind of file system. Windows uses NTFS, Linux uses FAT and there are different types of FAT systems too. So, to create any…
-
Secure way to access dark web on android
Everything is on mobile and when we analyze the traffic we are getting to internet most of the sources are from mobile. Every web application is making their mobile apps. But for most of the people who wants to access dark web their first choice is desktop or laptop. To make it handy I have…
-
11 Insane Things You Can do with Batch Programming
Howdy! In this article we are going to learn how to create some virus programs with the help of batch scripts. Let’s get on to some grey shade of the Batch Programming. Wait, wait, what is this Batch Programming first? Don’t worry, by the end of this article you are going to learn what is…
-
What is Supply Chain Attack: The Attack That Keeps Every WordPress Site Vulnerable
There are many attacks that are happening on the internet. Each attack belongs to some type of attack family. One of my friend works in PayPal and he said PayPal alone gets 3000 attacks per second and imagine how many attacks are carried out worldwide. In this article I am going to explain to you…
-
How to find IP address of anyone
To attack anyone the first thing you must know is to find the IP address of the target. There are many tools that help to find IP address but here in this tutorial I will help you with the tool called IP puller or IP logger. IP logger grabs the IP address of the victim…