Skip to content

Category Archives: GBlog

What are cookies? Cookies are small files which are stored on a user’s computer. They are used to hold a modest amount of data specific… Read More
Brute force attacks work by calculating every possible combination that could make up a password and testing it to see if it is the correct… Read More
Pre-requisite: Linear Regression This article discusses the basics of Logistic Regression and its implementation in Python. Logistic regression is basically a supervised classification algorithm. In… Read More
This article aims at giving an introduction to magic numbers and file headers, how to extract a file based on magic numbers, and how to corrupt… Read More
We have introduced and discussed importance of hashed passwords. To create strong hashed passwords, we must understand some terminology related to it and then we… Read More
Note : This is not to motivate you to hack and shut down websites but to provide a general idea of how the daily hacks… Read More
Machine learning is a type of artificial intelligence (AI) that provides computers with the ability to learn without being explicitly programmed. Machine learning focuses on… Read More
Slow HTTP are application layer Denial Of Service (DoS) attacks and have a potential to knock down a server with limited resources. Because of the… Read More
What is Session Hijacking? TCP session hijacking is a security attack on a user session over a protected network. The most common method of session… Read More
Introduction to SVMs: In machine learning, support vector machines (SVMs, also support vector networks) are supervised learning models with associated learning algorithms that analyze data… Read More
Prerequisite: Downloading files in Python, Web Scraping with BeautifulSoup We all know that Python is a very easy programming language but what makes it cool… Read More
Problem statement As we all know, in a spring application we provide configuration information through ‘ApplicationContext’. There are multiple classes provided by spring framework that… Read More
The following code in python uses OpenCV library which is employed for image processing techniques. The program allows the detection of a specific color in… Read More
A path traversal attack allows attackers to access directories that they should not be accessing, like config files or any other files/directories that may contains… Read More
Code injection is the malicious injection or introduction of code into an application. The code introduced or injected is capable of compromising database integrity and/or… Read More