Techie Talks
-
Web Hacking
Hardening DHCP Services
Hardening DHCP Services: Dynamic Host Configuration Protocol (DHCP) is used in many networks to automate the assignment of IP addresses…
Read More » -
Web Hacking
Hardening Web Servers
Hardening Web Servers: Web servers are one of the favorite areas for attackers to exploit because of the reach they…
Read More » -
Web Hacking
Hardening DNS Servers
Hardening DNS Servers: Domain Name Service (DNS) servers resolve hostnames to IP addresses. This service allows a website name such…
Read More » -
Web Hacking
Hardening FTP Servers
Hardening FTP Servers: File Transfer Protocol (FTP) servers are not intended for high-security applications because of their inherent weaknesses, Most…
Read More » -
Security+
Hardening Email Servers
Hardening Email Server: Email servers provide the communications backbone for many businesses they typically run either as an additional service…
Read More » -
Networking+
Securing the Network
Securing the Network: Obviously, network security is broad topic, and it will be addressed throughout these articles However, there are…
Read More » -
Cloud
The Private – Public – Community and Hybrid Cloud
Private Cloud: According to NIST, a private cloud is defined as follows: The cloud infrastructure is provisioned for exclusive use…
Read More » -
Web Hacking
WRITING THE PENETRATION TESTING REPORT
Writing the Penetration Testing Report: Like every other topic we have discussed, writing a good penetration testing report takes practice.…
Read More » -
Web Hacking
WIRESHARK: SNIFFING NETWORK TRAFFIC
Sniffing Network Traffic: Another popular technique that can be used to gain access to systems is network sniffing. Sniffing is…
Read More » -
Web Hacking
SIFTING THROUGH THE INTEL TO FIND ATTACKABLE TARGETS
Sifting Through the Intel to Find Attackable Targets: Once you have completed the steps in previously articles, you need to…
Read More »