Data visualization is an important part of Data Analytic. Matplotlib is the most popular data visualization module in python. Other module like Tensorflow uses matplotlib for visualization. Creating visualization refers to creating stuffs. Matplotlib is designed to be as usable as MATLAB, with the ability to use Python, and the advantage of being free andRead More
Category: Training
From a Network Engineer to Security Analyst
Entering the world of Information Security and opting for a career path can be very confusing, especially for a fresher in the field. Knowing where to begin and what to learn. Now there are a lot of sources people turn to for advice but very rarely you’d find a rule of thumb or a properRead More
Exploit Windows 8.1 using Media Centre Vulnerability (MCL)-MS15_100 With Metasploit–2017
NOTE: THIS POST IS ONLY FOR EDUCATIONAL PURPOSES. USE THIS AT YOUR OWN RISK. This post is about Microsoft Windows Media Centre MCL vulnerability. In this Post we discuss about MCL(MS15-100) vulnerability and exploit this vulnerability to compromise the windows 8.1 pro. The vulnerability could allow remote code execution if Windows Media Center opens aRead More
Sending Email using SMTP
Sending Email : Simple Mail Transfer Protocol (SMTP) is a protocol which handles sending e-mail and routing e-mail between mail servers. Python provides SMTP lib module which defines an SMTP client session object that can be used to send mail to any Internet machine with an SMTP or ESMTP listener daemon. Syntax : import smtplib Read More
Python List Comprehension
Python List Comprehension is the idea that is not common in most of the language. It is basically used to generate a list of elements having some specific property. Moreover, Python List Comprehension make code smaller but effective. The basic structure consist of Python List Comprehension three parameters. Variable Expression for output A variable representingRead More
Investigating the concept of Mining Bitcoin
What is crypto currency? Crypto currency types and the most famous one. What is crypto currency mining? Process behind the bitcoin mining. Concept of ‘nonce’. Can anyone do bitcoin mining with standard PC’s? Equipment’s required for mining bitcoin. Best strategy for mining bitcoins. What is crypto currency? It is a digital form of currencyRead More
CISSP,The most reputed exam of Information Security?
CISSP is the most reputed exam of Information Security Domain 1: Security and Risk Management 15% Domain 2: Asset Security 10% Domain 3: Security Architecture and Engineering 13% Domain 4: Communication and Network Security 14% Domain 5: Identity and Access Management (IAM) 13% Domain 6: Security Assessment and Testing 12% Domain 7: Security Operations 13%Read More
Enhance Your Data Security and Business Performance using ISO 27001
ISO 27001 Information Security Management System is an International Standard to strengthen the Information Security of any organisation. This is a powerful framework which helps the organisation to protect their data. An ISO certification is an external assurance to improve trust with both new and existing customers. While it’s impossible to guarantee security againstRead More
Bug Bounty Hunting, it’s pros and cons
What is bug bounty? Why bug bounty programs are held? How can one earn money by bug bounty hunting? What is the scope of bug bounty hunting? What are the pre requisite to become a successful bug bounty hunter? Sites that host bug bounty programs. Some best sources to start career bug bounty hunting.Read More
How an effective ISO 27001 can help you achieve GDPR?
Overview ISO 27001:2013 is Information Security Management System (ISMS). This is an international standard which has framework of policies and procedures that includes all technical, physical, legal and administrative controls involved in an organisation’s information risk management processes. General Data Protection Regulation (GDPR) is meant for protection of all the European citizen’s personal data. ItRead More