Trending questions in Cyber Security & Ethical Hacking

+1 vote
1 answer

Can a 42-year-old get into cybersecurity without an IT background?

Absolutely, you can break into the Cybersecurity ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
402 views
+1 vote
1 answer

Is it safe to use string concatenation for dynamic SQL queries in Python with psycopg2?

The use of string concatenation while building ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
614 views
+1 vote
1 answer

How can I use PHP to securely handle user sessions and prevent session hijacking?

In order to securely handle user sessions ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
487 views
+1 vote
1 answer

How do I start learning cybersecurity?

It's awesome that you're gaining interest in ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
358 views
+1 vote
1 answer

What is the best way to use APIs for DNS footprinting in Node.js?

There are several APIs that can help ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
594 views
+1 vote
1 answer

Are Cybersecurity and Information Security the same thing?

Cybersecurity and information security are related but ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
322 views
+1 vote
1 answer

Why is my brute-force attack on a web application failing after a few attempts?

If your brute-force attack is failing after ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
318 views
+1 vote
1 answer

How can I use Python for web scraping to gather information during reconnaissance?

Python is considered to be an excellent ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
543 views
+1 vote
1 answer
0 votes
0 answers

How do I write a simple PERL script to scan for open ports on a target machine?

I’m learning about network security and I ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
471 views
0 votes
0 answers

How can I implement basic input validation in Java to prevent common web vulnerabilities?

I’m working on a Java web application, ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
448 views
0 votes
0 answers

How do I use Python's subprocess to run multiple DNS queries in parallel?

I’m working on a Python script that ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
414 views
0 votes
0 answers

How can PHP be used to create a secure web application to prevent SQL injection?

I’m developing a web application using PHP, ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
309 views
0 votes
0 answers

Why can't I obtain user token from a compromised API?

Why can't I obtain user token from ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
503 views
0 votes
0 answers

How can I use JavaScript to create a basic keylogger for ethical hacking purposes?

I’m exploring ethical hacking techniques and I’ve ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
404 views
0 votes
0 answers

What should be in my resume to get a job in cyber security?

What should be in my resume to ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
399 views
0 votes
0 answers

Are cyber security and information security the same thing?

Are cyber security and information security the ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
372 views
0 votes
0 answers

Software Development vs Cyber Security

What is Software Development vs Cyber Security? READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

edited Oct 14, 2024 by Hoor 227 views
0 votes
0 answers

Can a 42-year-old get into cyber security without an IT background?

Can a 42-year-old get into cyber security ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
200 views
0 votes
1 answer

what is attack in cyber security

An "attack" or threat in cybersecurity refers ...READ MORE

Mar 1, 2024 in Cyber Security & Ethical Hacking by Roy
834 views
0 votes
1 answer

what is risk in cyber security?

In the context of cybersecurity, risk is ...READ MORE

Mar 1, 2024 in Cyber Security & Ethical Hacking by Shubh Saxena
767 views
+1 vote
3 answers

Not able to install arpspoof

There is no package called arpspoof. To use the arpspoof command, ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,180 points
65,280 views
0 votes
0 answers

what is ceh certification?

What is CEH certification? READ MORE

Feb 22, 2024 in Cyber Security & Ethical Hacking by Hoor
• 4,690 points
526 views
0 votes
1 answer

what is meant by cyber security

The practice of cyber security threats preventing ...READ MORE

Feb 19, 2024 in Cyber Security & Ethical Hacking by pooja
• 24,450 points
645 views
0 votes
1 answer

How to find password of a wifi using ubuntu 18.06?

To hack a wifi password using ubuntu: You ...READ MORE

Apr 24, 2020 in Cyber Security & Ethical Hacking by Kim

edited Oct 6, 2021 by Sarfaraz 41,784 views
0 votes
1 answer

What is CIA in Cybersecurity?

CIA(Confidentiality, Integrity, and Availability) represents the foundational ...READ MORE

Jan 22, 2024 in Cyber Security & Ethical Hacking by Beth
837 views
0 votes
1 answer

What is Cyber Ark?

CyberArk is a cybersecurity company that specializes ...READ MORE

Dec 15, 2023 in Cyber Security & Ethical Hacking by Preetham
856 views
0 votes
0 answers

How to be an Ethical Hacker?

What steps and guidelines should one follow ...READ MORE

Dec 19, 2023 in Cyber Security & Ethical Hacking by Saniya
• 3,360 points
431 views
0 votes
0 answers

what is ethical hacking course ?

Nov 29, 2023 in Cyber Security & Ethical Hacking by Evanjalin
• 36,180 points
482 views
0 votes
1 answer

what degree for cyber security

For a career in cybersecurity: Bachelor's Degree: Choose a ...READ MORE

Nov 3, 2023 in Cyber Security & Ethical Hacking by Rahul
782 views
0 votes
0 answers

How to learn Hacking on mobile?

What are the steps and resources for ...READ MORE

Nov 2, 2023 in Cyber Security & Ethical Hacking by Saniya
• 3,360 points
689 views
0 votes
1 answer

How to learn hacking for free?

Gaining ethical hacking skills without incurring any ...READ MORE

Oct 26, 2023 in Cyber Security & Ethical Hacking by anonymous
• 3,360 points
908 views
0 votes
1 answer

What is cyber security course?

A cybersecurity course is designed to equip ...READ MORE

Oct 26, 2023 in Cyber Security & Ethical Hacking by anonymous
• 3,360 points
816 views
0 votes
1 answer

What is Computer Security?

Computer security, often referred to as cybersecurity, ...READ MORE

Oct 18, 2023 in Cyber Security & Ethical Hacking by anonymous
• 3,360 points
1,082 views
0 votes
1 answer

Career in ethical hacking

To pursue a career in ethical hacking ...READ MORE

Oct 23, 2023 in Cyber Security & Ethical Hacking by Adarsh
774 views
0 votes
1 answer

Cyber Security

Cybersecurity protects: 1. Information: Shields data from unauthorized ...READ MORE

Oct 23, 2023 in Cyber Security & Ethical Hacking by anonymous
• 3,360 points
623 views
0 votes
1 answer

What is cia triad in cyber security?

The CIA triad, in the context of ...READ MORE

Oct 5, 2023 in Cyber Security & Ethical Hacking by anonymous
• 3,360 points
1,317 views
0 votes
1 answer

What is Information Security?

Information Security, often referred to as InfoSec, ...READ MORE

Oct 16, 2023 in Cyber Security & Ethical Hacking by anonymous
• 3,360 points
679 views
0 votes
1 answer

How to become an Ethical Hacker?

Steps and Requirements for a Career in ...READ MORE

Oct 12, 2023 in Cyber Security & Ethical Hacking by Saniya
• 3,360 points
746 views
0 votes
0 answers

what is cybersafe?

Could someone explain what cybersafe is and ...READ MORE

Oct 1, 2023 in Cyber Security & Ethical Hacking by Rajarshi
• 470 points

edited Oct 4, 2023 by Tanishqa 553 views
0 votes
0 answers

what is wireshark in cyber security ?

Could someone give a simple use case ...READ MORE

Sep 23, 2023 in Cyber Security & Ethical Hacking by anonymous
• 470 points
693 views
0 votes
0 answers

what is risk management in cyber security

What does 'risk management' entail within the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
910 views
0 votes
0 answers

what does information security do

What are the primary functions and responsibilities ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
909 views
0 votes
0 answers

what is cia triad in cyber security

What does the 'CIA Triad' represent in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
831 views
0 votes
0 answers

what does a cyber security analyst do

What are the primary responsibilities and roles ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
704 views
0 votes
0 answers

What is threat in cyber security

Hi, My company takes cybersecurity very seriously and ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
674 views
0 votes
0 answers

what is information security analyst

What does the role of an information ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
670 views
0 votes
0 answers

what does cybersecurity protect?

Sep 4, 2023 in Cyber Security & Ethical Hacking by Rajarshi
• 470 points
664 views
0 votes
0 answers

why is computer security important

What are the key reasons for the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
648 views