DEV Community

shiva varma profile picture

shiva varma

404 bio not found

Joined Joined on 
Nessus: Mastering Vulnerability Assessment

Nessus: Mastering Vulnerability Assessment

Comments
1 min read
Burp Suite: The Web Application Security Powerhouse

Burp Suite: The Web Application Security Powerhouse

Comments
1 min read
Wireshark: A Window into Your Network Traffic

Wireshark: A Window into Your Network Traffic

Comments
1 min read
Nmap: Mapping Your Network Like a Pro

Nmap: Mapping Your Network Like a Pro

Comments
1 min read
Introduction to Metasploit: A Hacker's Toolkit

Introduction to Metasploit: A Hacker's Toolkit

Comments
1 min read
Protecting Against Distributed Denial-of-Service (DDoS) Attacks

Protecting Against Distributed Denial-of-Service (DDoS) Attacks

Comments
1 min read
The Importance of Secure Passwords

The Importance of Secure Passwords

Comments
2 min read
Social Engineering: Manipulating the Human Element

Social Engineering: Manipulating the Human Element

Comments
1 min read
Ransomware: Pay or Fight Back?

Ransomware: Pay or Fight Back?

Comments
1 min read
The Role of Firewalls in Cybersecurity

The Role of Firewalls in Cybersecurity

Comments
1 min read
What Are Zero-Day Exploits?

What Are Zero-Day Exploits?

Comments
1 min read
Why Multi-Factor Authentication Matters

Why Multi-Factor Authentication Matters

Comments
1 min read
Understanding Phishing Attacks

Understanding Phishing Attacks

Comments
1 min read
SQL Injections

SQL Injections

Comments
2 min read
Intro to firewalls🔥

Intro to firewalls🔥

Comments
2 min read
Understanding Password Cracking

Understanding Password Cracking

Comments
2 min read
Nmap

Nmap

Comments
2 min read
Malware

Malware

Comments
2 min read
Gobuster

Gobuster

Comments
2 min read
Creating Malware in Python

Creating Malware in Python

Comments
1 min read
WireShark and Scapy

WireShark and Scapy

Comments
2 min read
Cryptography

Cryptography

Comments
2 min read
Python,SQL and Linux

Python,SQL and Linux

Comments
2 min read
Security Information and Event Management (SIEM) And Playbook

Security Information and Event Management (SIEM) And Playbook

Comments
2 min read
Ethical concepts that guide cybersecurity decisions

Ethical concepts that guide cybersecurity decisions

Comments
2 min read
SQL-Injections💉

SQL-Injections💉

Comments
2 min read
Man-In-The-Middle-Attack (MITM)

Man-In-The-Middle-Attack (MITM)

Comments
2 min read
Enumeration

Enumeration

Comments
2 min read
WireShark

WireShark

Comments
2 min read
Social Engineering Attack

Social Engineering Attack

Comments
1 min read
Linux

Linux

Comments
3 min read
Networking Step-by-Step 👣

Networking Step-by-Step 👣

Comments
1 min read
Understand the terminologies of in CS

Understand the terminologies of in CS

Comments
3 min read
Understand the terminologies of in CS

Understand the terminologies of in CS

Comments
3 min read
Understanding IP Address Types, Subnets, and Loopback

Understanding IP Address Types, Subnets, and Loopback

Comments
2 min read
loading...