Migration to CloudIn today’s world, many organizations, communities, or individuals are inclined towards transitioning to the cloud with the aim of creating…Dec 15, 20231Dec 15, 20231
UUID SpecificationsImagine you are writing a license validation software. Or you want to take action against end-users being enumerated. We may need UUID…Jul 2, 2023Jul 2, 2023
Published inCoding WizardsLinux Black Screen On BootBeing a Linux lover comes with some responsibilities. One of these responsibilities is to catch and resolve bugs. In this post, I will…Nov 19, 2022Nov 19, 2022
Published inCoding WizardsSystem Architecture For Cyber SecurityIn order to determine efficient attack vectors, we should have deep good understanding about System Architecture. With this we will be able…Oct 9, 20224Oct 9, 20224
Published inCoding WizardsOSI Model For Cyber SecurityTo be able to attack and defend effectively, we need to have deeply understanding osı model. Open Systems Interconnection model (OSI…Jun 27, 2022Jun 27, 2022