Courses
Tutorials
Jobs
Practice
Contests
Data Structure
Java
Python
HTML
Interview Preparation
Trending Now
DSA
Web Tech
Foundational Courses
Data Science
Practice Problem
Python
Machine Learning
JavaScript
System Design
Django
DevOps Tutorial
Java
C
C++
ReactJS
NodeJS
CP Live
Aptitude
Puzzles
Projects
Closest number to N having the given digit sum
Given two integers N and D, the task is to find the closest number to N with the sum of digits equal to D.Examples:Input: N = 2022, D = 25Output: 1996Explanation: First sm...
Read More
Mathematical
Competitive Programming
DSA
What is an Impersonation Attack?
Cybersecurity is one of the essential requirements of today's generation. Cybersecurity ensures that the safety of the computer network is maintained, and the computer sys...
Read More
Picked
Ethical Hacking
Ethical Hacking - Network Attacks
How to Maintain Audit Information For DML in SQL?
Pre-requisites: Audit TrailIn today's world, data plays a vital role for any organization. Not just for the organization but also for customers. It becomes vital in any ap...
Read More
SQL
Semi Supervised Classification in Data Mining
A classification between supervised and unsupervised learning algorithms is a type of machine learning called semi-supervised learning. At the time of training, it uses bo...
Read More
Picked
Data Mining
How to Prevent Backdoor Attacks?
Cyber security or security of the web deals with the security mechanism of the cyber world. Cyber security is extremely necessary as it is important that computer networks...
Read More
Picked
Ethical Hacking
Ethical Hacking - DDos
What is CSV Injection?
Cyber Security is a crucial necessity of the modern world. Cyber Security involves security mechanisms that protect computer network systems from being exploited on their ...
Read More
Picked
Ethical Hacking
Ethical Hacking - System Hacking
Types of SQL Injection (SQLi)
SQL Injection is an attack that employs malicious SQL code to manipulate backend databases in order to obtain information that was not intended to be shown, The data may i...
Read More
Ethical Hacking
Ethical Hacking - Session Hijacking
Ingress Filtering
Ingress filtering is a technology that is designed to classify and prevent internet access by identifying unauthorized users. What ensures the security of an organization’...
Read More
Picked
Ethical Hacking
Ethical Hacking - Enumeration
What are Session Replay Attacks?
An ethical hacker is able to use a session replay attack with the help of tools like Wireshark or Hping3. The hacker's goal is to gain access to the network, data, and res...
Read More
Picked
Ethical Hacking
Ethical Hacking - Session Hijacking
Ethical Hacking - Network Attacks
What is Phlashing?
Phlashing is a type of Denial of Service (DoS) Attack, also known as a Permanent Denial of Service Attack (PDoS) which is very severe because there is no way to undo this ...
Read More
Picked
Ethical Hacking
Ethical Hacking - DDos
What is DLL Hijacking?
Cyber attacks are harmful attacks on the computer networking system which aim at exploiting user confidential information. Awareness and proper knowledge of cyber attacks ...
Read More
Picked
Ethical Hacking
Ethical Hacking - Session Hijacking
ARIN in Ethical Hacking
ARIN is the American Registry for Internet Numbers, a non-profit corporation that assigns IP addresses to organizations in North America and beyond. ARIN stands for the Am...
Read More
Picked
Ethical Hacking
Ethical Hacking - Misc
Black Hole Filtering in Ethical Hacking
Black hole filtering is something you can do in the realm of ethical hacking that is meant to protect an organization’s private data. This kind of software has been around...
Read More
Picked
Ethical Hacking
Ethical Hacking - Footprinting
BlueSmack Attack in Wireless Networks
Blue smacking is one of the older types of attacks against the protocol. In our investigation of this attack, you'll find that it's a variant of a common attack called den...
Read More
Picked
Ethical Hacking
Ethical Hacking - Network Attacks
What is Failure to Restrict URL Access?
Hacking is a term used to describe the process of gaining remote access to other computers, most commonly through the internet. Ethical hacking refers to the process of ha...
Read More
Picked
Ethical Hacking
Ethical Hacking - System Hacking
1
...
4176
4177
4178
...
11560