Skip to main content

Posts

Nmap for beginners - "Read Disclaimer First"

/!\/!\ Disclaimer /!\/!\ Nmap is a powerful network scanner that can be used for a variety of purposes. It is a valuable tool for network administrators, security professionals, and penetration testers, so any illegal use leaves traces in the server logs where the tests were made, you will be charged for serious legal consequences , in other words , you will break the law. DO NOT USE IT RANDOMLY OR WITHTOUT PERMISSION. What is Nmap? Nmap is a free and open-source network scanner that is used to discover hosts and services on a network, as well as to audit the security of a network developed concept & software near 1997 BUT ... unfortunately you will continue in 2023 to use it in order to test the unsecured platforms and old databases. How does Nmap work? Nmap uses a variety of techniques to scan a network, including: TCP SYN scanning: This is the most common type of Nmap scan. It works by sending a TCP SYN packet to a target port. If the port is open, the target will r

Bard or ChatGPT ? - AI Experiment updates

Bard and ChatGPT are both large language models (LLMs) that are trained on massive datasets of text and code. They can generate text, translate languages, write different kinds of creative content, and answer your questions in an informative way. However, there are some key differences between the two models. Google Bard is trained on an “infiniset” of data chosen to enhance its dialogue and has access to the internet in real time, whereas ChatGPT is trained on a pre-defined set of data that hasn't been updated since 2021. This means that Bard has access to more up-to-date information and can generate more comprehensive and informative responses. Additionally, Bard is able to access and process information from the real world through Google Search, which gives it a wider range of knowledge to draw from. ChatGPT, on the other hand, is better at generating creative text formats, such as poems, code, scripts, musical pieces, email, letters, etc. It is also more efficient

WITE HAT ALLIANCE - KEYNOTE2023 URL

  Informations about the URL/Online Seat on Reddit at r/White_Hat_Alliance Posted from Reddit :  https://www.reddit.com/r/White_Hat_Alliance/

SQL injection: Basics - Tip for Developers Part 1/

  In many forums, and articles available on the internet you always find some articles about what called "dorks" which is a method used by attackers to identify the sql injection possibility on your sql app. Tip for Developers , after the setup of the Anti-DDOS procedures you should secure your code by some basics stuff if you see that something can be possible from the given example. Often using sql operate to a database system: Back-up procedures and the use of secure hardware are as important as comprehensive protection measures against external access, "So-called SQL injections", on the other hand, represent a great danger especially for classic relational database models and the information implemented there. What is an SQL injection? The term SQL injection refers to the exploitation of a security flaw in relational database systems that refer to the SQL language. The attacker uses data entered by the user on the database interface which is not s

Ransomware Prevention - Checklist 04/2023

  The authorities have always recommended not to give up & pay a ransom, “you may encourage attackers to target other organizations”, and there is no guarantee that stolen files will be recovered, so prevention is a best Tool , here is some checklists you must check in 2023 when you manage your work flow make sure you are using the right procedures. - Use Advanced Threat Intelligence - Implement Continuous Monitoring of Systems - Use Behavioral Analysis - Use 'Software-Defined' Perimeter - Use Zero-Trust Architecture - Security Orchestration & Automation Response - Implementing Browser Isolation or Virtual Browser Solutions - Spam Filters/Email Content Filtering - Implementing DNS Security - Use Security Information and Event Management systems Always keep monitoring & logs / backup procedures ON. WhiteHat Alliance Source : Discover The White Hat Alliance on Reddit https://www.reddit.com/r/White_Hat_Alliance/comments/12f7ey3/ransomware_prevention_chec

"Artificial Intelligence" Introduction ( Tips for CEOs )

Marketers use phrases like "AI" and "machine learning" to make their products smarter, but AI alone won't make software perform perfectly or ensure fit. The main question concerning AI tools is how the system will genuinely aid you in practice always. automatically to your particular demands and procedures from a platform.  1. Don't be "duped" by trendy terms. Yes 100% like "AI" and "machine learning" to make their products smarter, but AI alone won't make software perform perfectly or ensure fit. The main question concerning AI tools is how the system will genuinely aid you in practice always. automatically to your particular demands and procedures from a platform. The key is to make sure the tools you utilize truly offer the functionality you require while maintaining emphasis on the practical business benefits and competitive advantages you will derive from your usage of AI. 2. Encourage openness ,  Do not be afraid. AI i

UX Researcher - Job / Requirements

Today the earth discuss., " The Emergence of the infraweb and new consumption patterns have created new jobs " UX research tends to understand user expectations and barriers. Among them, that of UX researcher. It's a varied, exciting job, where you learn to question yourself in the broad sense, while cultivating an ability to listen actively and a keen sense of analysis according to the job description, So you wonder what are the differences with UX and UI design? What training, what roles to perform next and for what salary? I have to agree when the future candidate should participate in at least three or two open source communities as showcases in Infosec Field, I believe this task is not a worksheet job specially for large companies / organisation flow. Here are some examples to take as a requirement :  Conduct and evaluate quantitative and qualitative research. Primary and secondary user research. Marketing ethnographic research. Gather & analyze data. Work close