Skip to main content

Posts

The Top 5 Laptops Under 50,000 in India December 2023

  Explore the curated selection of the finest laptops under 50,000 Rupees available on prominent e-commerce platforms such as Amazon and Flipkart, as well as in offline market. Enhance your festive season with the perfect blend of performance and affordability this Christmas and New Year's Eve. All the 5 laptops, those are listed below, all of them are capable of playing mid-range games, video editing, practice coding, and also for those who starts journey in any IT department. All of them having outstanding performance under 50,000 Rupees. You're in the proper location! let's see all the 5 laptops in this list. 1. HP Victus Ryzen 5 Hexa core One of the best laptops at this price range, available in the market. With the HP Victus Ryzen 5 Hexa core 5600H, fall deeper in love with computing than ever before. It comes with AMD Radeon RX 6500M of GDDR6 dedicated graphic memory of 4 GB, pre-installed 8 GB DDR4 RAM and it can be maximum upgraded up to 16 GB. The CPU clock speed i

What is VLAN? And What is the purpose of using VLAN ?

What is  VLANs? (Virtual Local Area Network) Those who are learning networking first time they first misunderstood the VLAN concept and non-technical background students not able to understand it very well, so this article will describe the concept of VLAN in easy manner. Let's understand the concept of VLAN using a small example! Imagine you live in a big apartment building with lots of units, and there are many other people living there too. Each apartment has its own set of rooms and, usually, the people in one apartment don't want other people from different apartments coming into their rooms. They are private and have their own area. Now, think of a VLAN (Virtual Local Area Network) like creating separate areas in this apartment building. It's as if you can use a magic paint to draw invisible lines that divide the building into sections, and each section has its own set of rooms. With VLANs in a computer network: You can have different groups of computers, kind of like

Top three IT domains where we can use Python skills

  Python is the most popular programming language, and its very easy to learn. In mostly every IT domain, python is used to build applications, tools, automation, and many more purposes with the help of plenty of libraries in python. Once you have learned the basics of python programming, you can use your programming skills to automate tasks, customise tools, and create practical scripts. In this blog, we will see the top three IT domains where python knowledge is very useful to have, and which python libraries are used in each domain. The Top three IT domains where we can use python. Networking CyberSecurity Cloud Computing Python For Networking Why Python used in the Networking Domain? As a network engineer or Cisco network engineer, they prefer to use Python instead of other programming languages because of the easily available libraries and because it is easy to implement. With the help of python, you can automate Cisco networking procedures, which will save plenty of time. We will

How to practice SQL injection using bWAPP?

By tricking the query into being used for something other than what the original programmer intended, an attacker can grant the user access to query the database by using a method called "SQL injection." In SQL injection, there are three categories: In-band SQLi Out-band SQLi Inferential (blind) SQLi I am not going to waste time describing each one; there are plenty of articles and videos available on YouTube where you can learn about each of the categories in depth. This blog will describe how to perform SQL injection in bWAPP or any other web-based, vulnerable application. The bWAPP is having most of the latest attack; that's the only reason I considered this buggy web application platform. Without further ado, let us begin practicing. If you have learned the SQL injection, this blog will be easy for you. I choose SQL injection (GET/Search) from the bWAPP option selection.  1.  The first method is to find out how many columns are present in the query. To do that, use th

Best Web Application Security books to read for beginners in 2023

  Books are the important role in acquiring knowledge through self-study. Cyber security has lots of books available in the offline market as well as online market.  The main important part is to choose perfect books that provide the best information that we require. In this blog, we will look at all of the best books available in the online or offline market that will provide us useful information. Just keep in mind in this blog, I have focused on the web application security field of cyber security. People can select any book as per their interest, and as you all know, cyber security is a broad domain. It's perfectly fine if someone is interested in another area of cyber security. I attempted to include valuable books ranging in difficulty from beginner to advanced.  It is strongly advised that you first clear your basic concepts, such as networking, Linux command line, Windows basics, virtualisation, and web application language basics, before beginning to learn the mentioned bo

What are the Basic Nmap commands for Cyber security enthusiast.

Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service up-time.  Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.  It was designed to rapidly scan large networks but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. Let's check out the basic nmap command in our day-to day life. Host Scan Host scan is used by penetration tester to identify active host in a network by sending ARP request