Skip to content

Category Archives: Advanced Computer Subject

Brute force attacks work by calculating every possible combination that could make up a password and testing it to see if it is the correct… Read More
Pre-requisite: Linear Regression This article discusses the basics of Logistic Regression and its implementation in Python. Logistic regression is basically a supervised classification algorithm. In… Read More
We have introduced and discussed importance of hashed passwords. To create strong hashed passwords, we must understand some terminology related to it and then we… Read More
Machine learning is a type of artificial intelligence (AI) that provides computers with the ability to learn without being explicitly programmed. Machine learning focuses on… Read More
Slow HTTP are application layer Denial Of Service (DoS) attacks and have a potential to knock down a server with limited resources. Because of the… Read More
We are given a data set of items, with certain features, and values for these features (like a vector). The task is to categorize those items… Read More
What is Session Hijacking? TCP session hijacking is a security attack on a user session over a protected network. The most common method of session… Read More
Introduction to SVMs: In machine learning, support vector machines (SVMs, also support vector networks) are supervised learning models with associated learning algorithms that analyze data… Read More
A path traversal attack allows attackers to access directories that they should not be accessing, like config files or any other files/directories that may contains… Read More
Code injection is the malicious injection or introduction of code into an application. The code introduced or injected is capable of compromising database integrity and/or… Read More
Command injection is basically injection of operating system commands to be executed through a web-app. The purpose of the command injection attack is to inject… Read More
A format string is an ASCII string that contains text and format parameters. Example: // A statement with format string printf("my name is : %s\n",… Read More
Denial of Service (DoS) is a cyber-attack on an individual Computer or Website with intent to deny services to intended users.Their purpose is to disrupt… Read More
K-Nearest Neighbors is one of the most basic yet essential classification algorithms in Machine Learning. It belongs to the supervised learning domain and finds intense… Read More
Most of the web applications require their users to authenticate themselves by asking them username and password. They compare the user supplied credentials with the… Read More