Skip to content
  • About
  • About Me
  • Blogs
  • Home
  • My Journey
  • Privacy Policy
YouTube
Krish
Growing Hacker
  • Home
  • Blogs
  • About
  • My Journey
  • Privacy Policy
YouTube
Krish
Growing Hacker
BlogInformativeCyber Security

What is a Shadow Stack ?

Shadow stack is a secondary stack present in your computer that stores return addresses of the main stack.
KrishNov 16, 2024Nov 30, 2024
editing-files-in-linux-part1
LinuxTutorial

Linux Essentials: Stdin, Stdout, Echo and Printf

Hello guys !! 👋 Today, we’ll explore how Linux handles input and output, along with essential commands like echo and printf.
KrishSep 29, 2024Nov 30, 2024
Cyber SecurityBlogInformative

What is Data Execution Prevention (DEP) in OS ?

Data Execution Prevention (DEP) is an essential security feature in modern operating systems to protect computers from harmful attacks.
KrishSep 29, 2024Nov 30, 2024
BlogInformativeLinux

The Linux Time Paradox (Year 2038 Problem)

Understand why you are unable to use Linux time beyond the year 2038 or 1902. This is because of the time representation in Linux and how it is stored.
KrishSep 15, 2024Nov 30, 2024
BlogInformativeLinux

What are Linux Kernel Security Features !!

The kernel is the core of any Operating system, making it the happiest place for any malware to run its malicious code.
KrishAug 31, 2024Nov 30, 2024
LinuxBlog

Linux File Permissions | Learn Now !!

Everything is a file in Linux and these files have permissions associated with them. Let's see what these permissions are and how to customize them.
KrishJul 23, 2024Nov 30, 2024
LinuxTutorial

Understand The Linux Filesystem

The Linux filesystem might seem complex at first, but fear not! Today we are going to cover most...
KrishMay 10, 2024Dec 8, 2024
basic-linux-commands
LinuxTutorial

Learn Basic Linux Commands and Terminology Now !!

Before starting anything we should at least have an idea of how we can navigate through the Linux...
KrishMar 25, 2024Nov 30, 2024
linux-tour
LinuxTutorial

A Short Tour of Kali Linux In 10 min

Welcome back! This is the 1st part of this series and in this part, you are going to...
KrishMar 15, 2024Nov 30, 2024
Intro-Linux-Basics-For-Hackers
TutorialLinux

Announcing Linux Basics For Hackers Series

Linux is versatile and you will have to work with it one day or another, in the world...
KrishMar 8, 2024Nov 30, 2024
12345

Hacking

What is ADB and How To Install it in Windows and Linux ?

adb stands for Android Debug Bridge by which you can get root access to your phone terminal. So lets see how you can install it...

Read More

What is MBR, it's Working and Hacking !!

MBR or Master Boot Record is a partition scheme that has been used for decades. In this blog we will see MBR structure, history and hacking possibilities....

Read More

What is GPT, its Structure and Working !!

GPT or GUID Partition Table is a successor of MBR that comes with a lot of amazing features to protect your data's integrity security and safety...

Read More

Cyber Security

How to Build a Resilient Network Security Architecture ?

Network Security isn’t just a buzzword – it’s the foundation of protecting your network and data....

Read More

Network Security for Connected Devices and IoT

Worried your smart gadgets might go rogue? Learn practical, real-world tricks to boost Network Security and keep your IoT universe hacker-free....

Read More

Enhancing Wireless Network Security: Protecting Your Digital World

Discover practical wireless network security tips to protect your WiFi from hackers and intruders. Learn simple steps anyone can take to enhance network security at home....

Read More

Hacking Journey

I Changed My Whole Life in 6 Months

Wanted to share my personal update, so here I am with another self blog. It's been 6 months since I wrote an update about my journey,...

Read More

The Beginning

This is my first blog of my journey which I am sharing with you.So, till this point, I have started a YouTube channel named Growing HackerAs you can see above...

Read More