DEV Community

Salman profile picture

Salman

I am Penetration tester and ethical hacker specializing in cybersecurity. Skilled in uncovering vulnerabilities and securing systems.

Joined Joined on  Email address zeroday195@gmail.com
Navigating the Digital Frontier: A Cybersecurity Primer for Business Owners

Navigating the Digital Frontier: A Cybersecurity Primer for Business Owners

Comments
2 min read
The Role of AI in Cybersecurity: Defending Against the Next Generation of Attacks

The Role of AI in Cybersecurity: Defending Against the Next Generation of Attacks

Comments
1 min read
The Power of Reconnaissance in Cyber Security: Why You Should Prioritize Recon

The Power of Reconnaissance in Cyber Security: Why You Should Prioritize Recon

Comments
1 min read
Mastering Code: Why Programming is Indispensable in Cybersecurity

Mastering Code: Why Programming is Indispensable in Cybersecurity

1
Comments 1
1 min read
Web Application Penetration Testing: An In-Depth Guide

Web Application Penetration Testing: An In-Depth Guide

Comments
2 min read
Network Penetration Testing: Tools and Techniques

Network Penetration Testing: Tools and Techniques

2
Comments
2 min read
Understanding the Linux File System and Logs

Understanding the Linux File System and Logs

Comments
2 min read
Understanding Linux Before Diving into Cybersecurity

Understanding Linux Before Diving into Cybersecurity

Comments
2 min read
Cybersecurity Starts with the Network: Understanding the Basics

Cybersecurity Starts with the Network: Understanding the Basics

1
Comments
2 min read
Installing Kali Linux: A Step-by-Step Guide (Without the Headaches)

Installing Kali Linux: A Step-by-Step Guide (Without the Headaches)

Comments
1 min read
Cloud Security: Protecting Your Data in the Digital Age

Cloud Security: Protecting Your Data in the Digital Age

Comments
1 min read
Exploring the Poison Tool: Unveiling Educational Insights and Disclaimers

Exploring the Poison Tool: Unveiling Educational Insights and Disclaimers

Comments
1 min read
Unveiling the Hidden Risks: Exploring Flaws and Vulnerabilities in IoT

Unveiling the Hidden Risks: Exploring Flaws and Vulnerabilities in IoT

Comments
2 min read
loading...