Startertutorials Blog
Tutorials and articles related to programming, computer science, technology and others.
Subscribe to Startertutorials.com's YouTube channel for different tutorial and lecture videos.
Home ยป Page 23

Steganography

Suryateja Pericherla Categories: Security and Hacking. No Comments on Steganography

In this article we will look at what is steganography and the process of encoding and decoding an object using steganography.   Steganography means concealed writing. It is a way of data hiding. Steganography can also be referred using different names like data hiding, information hiding, and digital watermarking. Digital watermarking can be used to […]

Read the rest of this entry »

Password Cracking Techniques

Suryateja Pericherla Categories: Security and Hacking. No Comments on Password Cracking Techniques

In this article we will look at password cracking techniques. First we will start with what is password cracking and purpose of password cracking. Then we will look at types of password cracking techniques namely online, offline and non-electronic attacks.   What is Password Cracking and its Purpose A password acts as a key to […]

Read the rest of this entry »

Phishing Attack

Suryateja Pericherla Categories: Security and Hacking. No Comments on Phishing Attack

In this article we will look at phishing attack in a comprehensive way. We will start with what is phishing attack, phishing using email, methods of phishing, phishing techniques, types of phishing scams and much more.   What is Phishing? Phishing is the activity of sending genuinely seeming emails with fake links or attachments containing […]

Read the rest of this entry »

Cloud Computing Risks

Suryateja Pericherla Categories: Security and Hacking. No Comments on Cloud Computing Risks

In this article we will look at what is a cloud, what is cloud computing, cloud computing services and cloud computing risks.   What is Cloud? The “Cloud” is the combination of hardware (servers, disks, networking equipment) and software (virtualization software, operating system and other services) needed to run the hardware in a data center. […]

Read the rest of this entry »

Botnets in Cybersecurity

Suryateja Pericherla Categories: Security and Hacking. No Comments on Botnets in Cybersecurity

In this article we will look at what are botnets, life cycle of a botnet and different countermeasures against botnets.   What are Botnets? Bot refers to an automated program for performing a task, often over a network. Botnet refers to a collection of bots. Botnets are often used to perform malicious activities like distributing […]

Read the rest of this entry »

Cyberstalking

Suryateja Pericherla Categories: Security and Hacking. No Comments on Cyberstalking

In this article we will look at what is cyberstalking and types of cyber stalkers like online stalkers and offline stalkers.   What is Cyber Stalking? Cyber stalking is an act of harassing an individual, a group or an organization using information and communication technology (Internet). The behavior may include false accusations, monitoring, transmission of […]

Read the rest of this entry »
Facebook
Twitter
Pinterest
Youtube
Instagram
Blogarama - Blog Directory