Tagged articles
9 articles
Page 1 of 1
Raymond Ops
Raymond Ops
Dec 29, 2024 · Information Security

What Every Hacker Calls It: A Comprehensive Glossary of Cyber Threats

This article provides a detailed glossary of common hacking terms and techniques—from black‑hat attackers and backdoors to APTs, exploits, and dark‑web concepts—explaining each threat, its purpose, and how it impacts information security.

APTExploitThreats
0 likes · 17 min read
What Every Hacker Calls It: A Comprehensive Glossary of Cyber Threats
MaGe Linux Operations
MaGe Linux Operations
Mar 24, 2024 · Information Security

What Every Hacker Should Know: 27 Common Terms and Attack Techniques

This article provides a comprehensive glossary of 27 common hacking terms—from black‑hat and backdoor to zero‑day exploits and dark‑web concepts—explaining each technique, malware type, and security threat in clear, concise English for anyone interested in cybersecurity fundamentals.

APTExploitcybersecurity
0 likes · 18 min read
What Every Hacker Should Know: 27 Common Terms and Attack Techniques
21CTO
21CTO
Jul 20, 2023 · Information Security

Kevin Mitnick: From World’s Most Wanted Hacker to Security Guru

Kevin Mitnick, once dubbed the world’s most famous hacker and the first to be pursued by the FBI, transformed from a teenage social‑engineering prodigy into a celebrated information‑security consultant, author, and founder of Mitnick Security, leaving a lasting impact on computer security after his 2023 death.

Kevin Mitnickcomputer securityhacking
0 likes · 5 min read
Kevin Mitnick: From World’s Most Wanted Hacker to Security Guru
MaGe Linux Operations
MaGe Linux Operations
Feb 15, 2023 · Information Security

Unveiling DoS/DDoS Attacks: Techniques, Exploits, and Real Hacker Cases

This article explores the fundamentals and varieties of DoS and DDoS attacks, explains how special‑crafted packets, floods, SYN, UDP, and reflection/amplification methods work, and illustrates real‑world hacker groups such as DD4BC, Armada Collective, Fancy Bear, and their ransom tactics.

DDoSDoScybercrime
0 likes · 12 min read
Unveiling DoS/DDoS Attacks: Techniques, Exploits, and Real Hacker Cases
MaGe Linux Operations
MaGe Linux Operations
Aug 4, 2022 · Information Security

Essential InfoSec FAQ: From White‑Hat Basics to Advanced Attack Techniques

This comprehensive FAQ explains key information‑security concepts, covering white‑hat hacking, IP vs MAC addresses, common penetration‑testing tools, hacker types, footprinting methods, brute‑force, DoS, SQL injection, sniffing, ARP spoofing, MAC flooding, rogue DHCP, XSS, Burp Suite, pharming, defacement, website protection, keyloggers, enumeration, NTP, MIB, password‑cracking techniques, attack stages, and CSRF mitigation.

cybersecurityhackinginformation security
0 likes · 10 min read
Essential InfoSec FAQ: From White‑Hat Basics to Advanced Attack Techniques
ITPUB
ITPUB
Apr 24, 2017 · Information Security

Which Linux Commands Can Wipe Your System and How to Stay Safe

The article lists a series of Linux commands that can permanently delete files, format disks, or overload system resources, explains why they are dangerous, and provides practical tips such as avoiding root for daily work, verifying command purpose, using trusted sources, and regularly backing up data.

LinuxPreventionShell
0 likes · 7 min read
Which Linux Commands Can Wipe Your System and How to Stay Safe
21CTO
21CTO
Feb 27, 2016 · Information Security

Samy Kamkar’s YouTube Hacks: Turning Everyday Gadgets into Security Experiments

Samy Kamkar’s YouTube series “Applied Hacking” showcases a range of inventive security experiments—from toy‑controlled garage doors and 3D‑printed lock‑picking robots to USB keyloggers, drone hijacking, remote‑car exploits, and credit‑card cloning tools—illustrating how everyday devices can be repurposed for hacking.

Hardware HackingIoTSamy Kamkar
0 likes · 9 min read
Samy Kamkar’s YouTube Hacks: Turning Everyday Gadgets into Security Experiments