Category Archives: GBlog

Speech Recognition is an important feature in several applications used such as home automation, artificial intelligence, etc. This article aims to provide an introduction on… Read More
GPS(Global Positioning System) is a satellite-based navigation system. It provides time and location-based information to a GPS receiver, located anywhere on or near the earth… Read More
This article explains how to test whether a website is safe from SQL injection using the SQLMAP penetration testing tool. What is SQL Injection? SQL… Read More
DHCP is an abbreviation for Dynamic Host Configuration Protocol. It is an application layer protocol used by hosts for obtaining network setup information. The DHCP… Read More
ReDoS stands for Regular Expression Denial of Service. The ReDoS is an algorithmic complexity attack that produces a denial of service by providing a regular… Read More
What are cookies? Cookies are small files which are stored on a user’s computer. They are used to hold a modest amount of data specific… Read More
Brute force attacks work by calculating every possible combination that could make up a password and testing it to see if it is the correct… Read More
Pre-requisite: Linear Regression This article discusses the basics of Logistic Regression and its implementation in Python. Logistic regression is basically a supervised classification algorithm. In… Read More
This article aims at giving an introduction to magic numbers and file headers, how to extract a file based on magic numbers, and how to corrupt… Read More
We have introduced and discussed importance of hashed passwords. To create strong hashed passwords, we must understand some terminology related to it and then we… Read More
Note : This is not to motivate you to hack and shut down websites but to provide a general idea of how the daily hacks… Read More
Machine learning is a type of artificial intelligence (AI) that provides computers with the ability to learn without being explicitly programmed. Machine learning focuses on… Read More
Slow HTTP are application layer Denial Of Service (DoS) attacks and have a potential to knock down a server with limited resources. Because of the… Read More
What is Session Hijacking? TCP session hijacking is a security attack on a user session over a protected network. The most common method of session… Read More
Introduction to SVMs: In machine learning, support vector machines (SVMs, also support vector networks) are supervised learning models with associated learning algorithms that analyze data… Read More