@nandun

Networking

#02 Data transmission mediums

In this article we will talk about the transmit mediums used to transmit data. The mediums used to transmit data are mainly divided into two parts. 1.Guided mediums2.Unguided mediums What

Read More
Networking

#03 Network models and Network Topologies

Network models The method of connecting computers so that they can exchange data and information is called network modules. We can maintain these as wireless networks as well as wired

Read More
Programming

What is ASCII (American Standard Code for Information Interchange)?

Imagine that you open a Word document and type something on the keyboard. Now you can see the letters you typed on the keyboard on the screen. How did that

Read More
Cybersecurity Hacker News

Cyber Terrorism & Information warfare – Red team, blue team and purple team

In today’s article, let’s talk about who the red team, blue team and purple team are. The main objective of the security team of any company or organization is to

Read More
Cybersecurity

Are you someone who is eager to become an Ethical Hacker? Then you will definitely need these things.

  Hacking is currently a trending topic among many people. Who are these hackers? Is Hacking a Good Thing? Why do people hack? Actually, hacking is one of the best

Read More
Cybersecurity

10 BEST Operating System (OS) for Hacking in 2024

  Today we are talking about hacking OS (Operating System). Have you just thought, how can we work on a laptop and PC without an OS? So we really can’t

Read More
Linux

Shortcut Keys in Kali Linux

We use shortcut keys to make it easier to use when working with any computer operating system and any software. For example, we use the C key along with the

Read More
Linux

Top 10 best hacking tools in Kali Linux

Kali Linux is a computer operating system based on Debian, a free and open source operating system. Today, Kali Linux is managed by the IT firm Offensive Security and was

Read More
Linux

Kali Linux Vs Fedora Linux

What is Kali Linux? Kali Linux is a Debian-based Linux distribution of the Linux family created in 2013 by Offensive Security. What is this Linux distribution? You have heard, haven’t

Read More
Cybersecurity

Don’t make these 12 mistakes if you are doing Cyber Security Jobs!

No matter what career you do, if you want to advance where you work, you have to adapt to it. That means you should be able to stay in place.

Read More