Skip to main content

Posts

RDP

 
Recent posts

Red Team and Pentest study

 Red Team and Pentest study  knowledge requirements : Red Team and Pentest study  শিখতে হলে আপনাকে প্রযুক্তি সম্পর্কে ভাল ধারনা থাকতে হবে। কোডিং এবং প্রোগ্রাম সম্পর্কে জানতে হবে। যারা হ্যাকিং করে তার ভাল মানের প্রোগ্রামার তাঁদের চিন্তা ভাবনা সাধারন মানুষের চিন্তা ভাবনার অনেক উপরে। ।  ১.নেটওয়ার্কিং: 1. Good understanding of OSI layer model 2. Understating of communication flow through each layer 3. Good understanding of functions of each layer 4. Understanding of major protocols in each layer 5. In-depth understanding of Layer 3 & Layer 4 protocols, IP, ICMP (layer 3) TCP, and UDP Protocols (layer 4). Overview of TCP/IP Layer model: 1. ARP / Understanding of Client & Server communication model 2. Ports common services run on Ephemeral port vs Well known ports. Understanding of major (everyday Layer 7) services/protocols: 1. DNS 2. DHCP 3. HTTP 4. HTTP Header 5. Fields HTTP Status Codes 6. HTTP maintains a state 7. HTTPS vs HTTP o FTP. Active vs Passive data transfer: 1. SSH / SS

Types of Operating System (OS)

Types of Operating System (OS) Types of Operating System (OS) Following are the popular types of OS (Operating System): Batch Operating System Multitasking/Time-Sharing OS Multiprocessing OS Real-Time OS Distributed OS Network OS Mobile OS Batch Operating System Some computer processes are very lengthy and time-consuming. To speed the same process, a job with a similar type of needs is batched together and run as a group. The user of a batch operating system never directly interacts with the computer. In this type of OS, every user prepares his or her job on an offline device like a punch card and submits it to the computer operator. Multi-Tasking/Time-sharing Operating systems The time-sharing operating system enables people located at a different terminal(shell) to use a single computer system at the same time. The processor time (CPU) which is shared among multiple users is termed as time-sharing. Real-time OS A real-time operating system time interval to process and respond to inpu

What is an Operating System?

  What is an Operating System? An  Operating System (OS)  is software that acts as an interface between computer hardware components and the user. Every computer system must have at least one operating system to run other programs. Applications like Browsers, MS Office, Notepad Games, etc., need some environment to run and perform their tasks. The OS helps you to communicate with the computer without knowing how to speak the computer’s language. It is not possible for the user to use any computer or mobile device without having an operating system.

What is Kernel in Operating System?

  What is Kernel in Operating System? The kernel is the central component of a computer operating system. The only job performed by the kernel is to manage the communication between the software and the hardware. A Kernel is at the nucleus of a computer. It makes communication between the hardware and software possible. While the Kernel is the innermost part of an operating system, a shell is the outermost one.

Build Your Own Security Operations Center (SOC) using The Hive

  City University  BACHELOR OF  SCIENCE IN COMPUTER SCIENCE  & Engineering (Cyber Security)  Project Report  Build Your Own Security Operations Center (SOC) using TheHive  Boni Yeamin Supervised by:               MD SAMRAT ALI ABU KAWSER  Lecturer  Department of computer science and engineering    City University  Bangladesh SEPTEMBER 2020 Security Operations Center(soc) A Security Operation Center (SOC) is a centralized function within an organization employing people, processes, and technology to continuously monitor and improve an organization's security posture while preventing, detecting, analyzing, and responding to cybersecurity incidents. A SOC acts like the hub or central command post, taking in telemetry from across an organization's IT infrastructure, including its networks, devices, appliances, and information stores, wherever those assets reside. The proliferation of advanced threats places a premium on collecting context from diverse sources. Essentially, t

IMPLEMENTATION LOG MANAGEMENT SYSTEM OF COMPUTER NETWORK DEVICES INFRASTRUCTURES BASED ON ELK STACK

IMPLEMENTATION LOG MANAGEMENT SYSTEM OF COMPUTER NETWORK DEVICES INFRASTRUCTURES BASED ON ELK STACK City University  BACHELOR OF  SCIENCE IN COMPUTER SCIENCE  & Engineering (Cyber Security)  Project Report  IMPLEMENTATION LOG MANAGEMENT SYSTEM OF COMPUTER NETWORK DEVICES INFRASTRUCTURES BASED ON ELK STACK  Boni Yeamin Supervised by: MD SAMRAT ALI ABU Lecturer  Department of computer science and engineering    City University  Bangladesh  January 2020 ABSTRACT Having good decision support is absolutely necessary nowadays because of the need to improve and gain value. For any organization, it is vital to obtain accurate knowledge of inventory level is key for staying in business and making it a profitable one. If inventory tracking is not efficient it could lead to major trouble in any business. For a business to thrive, it is essential to find the ideal level of inventory where it can sufficiently meet demand without under or overstocking value from anything it can. To understand t