Posted inCommon IT Security PORTS Posted by FachrezaR January 20, 2026 Ports are logical endpoints used in computer networks to manage different types of communication. They…
Posted inIT Security Security 101 WireShark Posted by FachrezaR January 20, 2026 Wireshark is a widely used network protocol analyzer designed to capture and inspect network traffic.…
Posted inIT Security Security 101 LinPEAS Posted by FachrezaR January 20, 2026 LinPEAS is a Linux privilege escalation auditing tool used in security testing and system assessments.…
Posted inIT Security Security 101 Uncategorized MYSQL Posted by FachrezaR January 20, 2026 MySQL is a widely used open-source relational database management system. It stores data in structured…
Posted inChess Hobbies Chess Posted by FachrezaR January 17, 2026 Chess is one of the oldest board games in the world and has a long…
Posted inIT Security Security 101 SQL Injection Posted by FachrezaR January 17, 2026 SQL Injection is a common web application attack technique that targets databases through vulnerable input…
Posted inIT Security Security 101 RSYNC Posted by FachrezaR January 17, 2026 rsync is a powerful file synchronization and transfer tool commonly used in Unix and Linux…
Posted inIT Security Security 101 MongoDB Posted by FachrezaR January 17, 2026 MongoDB is a popular open-source NoSQL database designed to store and manage large volumes of…
Posted inIT Security Security 101 GOBUSTER – Basic Security Posted by FachrezaR January 16, 2026 Gobuster is a fast and powerful directory and file brute-forcing tool commonly used in web…
Posted inIT Security Security 101 RDP – Basic Security Posted by FachrezaR January 16, 2026 RDP (Remote Desktop Protocol) is a protocol developed by Microsoft that allows users to remotely…