In this post I will discuss about Trojans that What are Trojans, How do trojan work, And How does trojan affect or devices. So let's start - What Is A Trojan? A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A … Continue reading What is Trojan And different Types of Trojan? How does Trojan work?
In this post, I will describe the open-source vulnerability scanning and network scanning tool that is NMAP. The full-form of NMAP is network-Mapper. NMAP is a very popular tool. Because this tool is free and open-source and used world-widely to find any vulnerability in any system or to scan a network. We can gather much … Continue reading What is NMAP? How to use Nmap For scanning? The Best Tool for information Gathering – NMAP
In this post, we will 'How are the public and private keys generated?' Here you will learn about asymmetric cryptography. Besides this, you will also learn about the ways of encryption and decryption of a text file in different ways by using public and private keys along with, the usage of private keys with the … Continue reading How are the public and private keys Generated? Encryption and Decryption of the file using Asymmetric Cryptography.