Profile cover photo
Profile photo
All About Testing
2 followers
2 followers
About
Posts

Post has attachment
Hardware Security Module (HSM) is an integral part of the security of enterprises and big businesses. Below 10 points give an insight of HSM, its usage, manufacturers of HSM, what are the features of HSM, the price of HSM, cloud-based HSM etc. (1) HSM is…
Add a comment...

Post has attachment
Hydra is a pre-installed tool in Kali Linux used to brute-force username and password to different services such as ftp, ssh, telnet, MS-SQL etc. Brute-force is a technique to try different username and password against a target to identify correct…
Add a comment...

Post has attachment
OWASP Mobile Top 10 : Brief Overview

Mobile devices are now an integral part of our life. Currently, people can’t imagine life without mobile devices. You are able to do 80 to 90 percent of tasks with mobile devices which you previously do with help of desktops or laptops. Mobile devices…
Add a comment...

Post has attachment
OpenSSL is the open source implementation of SSL and TLS protocol. It is general purpose cryptographic library and free to use both commercial and non-commercial under some simple license condition. Some software components of OpenSSL is FIPS 140-2…
Add a comment...

Post has attachment
OpenSSL is an open-source, full-featured cryptographic library. It contains a full implementation of SSL and TLS protocol which is responsible for transport layer security. It is developed mostly in C language and versions are available for the popular…
Add a comment...

Post has attachment
Top 15 Practical Examples of SED Linux Command #Linux #InfoSec #cybersecurity #LinuxTips

SED is a Linux command which is generally used to edit a file by replacing the string, delete strings and lines without even opening a file and without affecting the original content of file. It is also called Stream Editor. It also allows complex pattern…
Add a comment...

Post has attachment
Top 10 Interview Questions and Answers: Introduction to Embedded Systems (Basic) #EmbeddedSystems #IoT

Here we will discuss Top 10 Interview Questions and Answers on topic Introduction of Embedded Systems. This article is perfect for beginners who wants to increase understanding of embedded systems. I believe covering Questions and Answers are the best way…
Add a comment...

Post has attachment
Testssl.sh : Tool to check SSL/TLS related vulnerabilities #InfoSec #cybersecurity #NetworkSecurity #SSL #TLS

Testssl is an open source tool used to check the implementation of SSL/TLS on websites and gives a list of the cryptographic vulnerabilities or flaws by shooting simple commands. It is open source and very easy to use bash script which uses OpenSSL. Many…
Add a comment...

Post has attachment
Information Gathering is the first and foundation step in the success of penetration testing.  The more useful information you have about a target, more you able to find vulnerabilities in the target and hence able to find more serious problems in the…
Add a comment...

Post has attachment
Today, we will discuss the concept of different data types such as tuples, sets, and dictionaries in python. In the end of this article, we will cover some commonly asked questions on these concepts in Python. Tuples Tuples are similar to the list but…
Add a comment...
Wait while more posts are being loaded