adb stands for Android Debug Bridge by which you can get root access to your phone terminal. So lets see how you can install it...
Small Business Owners Need These Cyber Security Strategies Now !!
If you’re running a small business, I know you’ve got a lot on your plate. Between managing operations,
What is Control-Flow Enforcement Technology (CET) ?
The Intel's Control-Flow Enforcement technology also known as CET is a harware solution proposed by the intel to protect against Control Hijacking.
Mastering Nano Text Editor: A Complete Guide
Nano is a popular command-line text editor known for its simplicity and ease of use. Nano comes pre installed with various Linux Distors.
Essential Cyber Security for Non-Technical Users
Assuming you have little to no knowledge about Cyber Security, In this blog I am going to share...
How To Hide Files using Alternate Data Streams ?
Alternate data streams have been used for decades for hiding data we will see its history and benefits so
What is a Shadow Stack ?
Shadow stack is a secondary stack present in your computer that stores return addresses of the main stack.
Linux Essentials: Stdin, Stdout, Echo and Printf
Hello guys !! 👋 Today, we’ll explore how Linux handles input and output, along with essential commands like echo and printf.
What is Data Execution Prevention (DEP) in OS ?
Data Execution Prevention (DEP) is an essential security feature in modern operating systems to protect computers from harmful attacks.
The Linux Time Paradox (Year 2038 Problem)
Understand why you are unable to use Linux time beyond the year 2038 or 1902. This is because of the time representation in Linux and how it is stored.
What are Linux Kernel Security Features !!
The kernel is the core of any Operating system, making it the happiest place for any malware to run its malicious code.