Getting Information from the Operating System or Services on it – Banner Grabbing in Penetration Tests
When a connection is made to a system or service, the target system sends a response to this connection request. This message gives some clues …
Knowledge pool for Information Technologies
When a connection is made to a system or service, the target system sends a response to this connection request. This message gives some clues …
We would like to point out that if you have a Linux system you need to take care of and want to sleep comfortably, you …
While performing your operations with commands in the terminal, you wanted to make corrections in a file (resolv.conf etc.) with the nano editor. In this …
You should be aware that the deletion used in Linux and other operating systems does not actually delete your files. We will explain the detailed …
Most Linux users regularly install security updates and use the latest version. As far as we know, they are sensitive and careful. But this sensitivity …
ElasticSearch is a Search Engine preferred by companies working with BigData, that is, for content search, data analysis, queries and suggestions, especially due to its …
It is stated that the reason behind the recent increase in BEC attacks is the use of Google services by attackers. Due to Covid-19, businesses looking …
SSID (Service Set Identifier) are names that help identify and login to wireless home networks or hotspots. In other words, SSID is the “name of …
After SQL Server 2016 SP1 migration or when you are using SQL Server Management Studio 17.1/17.2 versions after SQL Server 2016 Sp1 installation when you …