PinnedComing from a small village how I landed in Cybersecurity without a tech degreeHey friends,Nov 18, 20234Nov 18, 20234
What is web browser vulnerabilities and how they are exploited?As a Cyber Security Engineer, We see a lot of vulnerabilities related to web browsers, no doubt they are provided patches and other…May 28, 2023May 28, 2023
How to manage a GKE cluster on GCP with console and cloud shellGoogle Kubernetes Engine (GKE) is a managed service on Google Cloud Platform (GCP) that allows you to deploy and manage containerized…Jan 1, 20232Jan 1, 20232
Basics of Cloud deployment modelsCloud deployment models refer to the various ways in which organizations can deploy and use cloud computing services.Dec 26, 2022Dec 26, 2022
Introduction to Cloud SecurityCloud security is a rapidly growing concern for businesses and individuals alike, as more and more data and services are being moved to…Dec 25, 20221Dec 25, 20221
What are “Strings” in Python?Remember, we can create a string by entering text between two single or double quotation marks. Like this.Feb 5, 2022Feb 5, 2022
Noobs Guide to Data Types in Python ProgrammingIn this blog, I am going to introduce the main data types that we use in Python.Feb 3, 2022Feb 3, 2022
Simple Operations using PythonSo Python can spell, but can it count? Let’s talk about calculations.Feb 2, 2022Feb 2, 2022
Cyborg Room Walkthrough TryhackmeA box involving encrypted archives, source code analysis and more.Jan 25, 2022Jan 25, 2022
How to remove crap using ‘cut’ cmd from Httprobe output?Default output from httprobe looks like; In certain conditions as ➖Jan 8, 20221Jan 8, 20221