Cyber Security Vulnerability Assessment
Vulnerability analysis is the next phase of Ethical hacking to identify the security holes or vulnerabilities in your system or network. A vulnerability assessment is a process of defining, identifying,
Nepal's #1 Tech Blog
Vulnerability analysis is the next phase of Ethical hacking to identify the security holes or vulnerabilities in your system or network. A vulnerability assessment is a process of defining, identifying,
Network Scanning Concepts Network scanning refers to a set of procedures for identifying hosts, ports, and services in a network. Network scanning is one of the components of intelligence gathering
We can distinct boot process in linux in 6 different stages These includes BIOS MBR GRUB Kernel Init Run Level Programs BIOS Acronym for Basic Input Output System BIOS loads
Drafting Orders The buyers decide to purchase the needed goods from the suppliers. The letter which the buyer sends to the supplier requesting supply of the stated goods is known
Adjustment Letters Responses to letters of complaint are called adjustment letters. They are of three forms. 100 percent yes. 100 percent no. Partial adjustment— you could agree with some of
Complaint Letters Introduction You need to politely state the problem. Include supporting documents, such as the following: Serial numbers Dates of purchase Invoice numbers Check numbers Names of salespeople involved
Bad-News Letter Unfortunately, you occasionally will be required to write bad-news letters. These letters might reject a job applicant, deny an employee a raise, tell a vendor that his or
Linux Authorization For security purpose, LINUX divides authorization in Ownership Permission Ownwership In linux, every file and directory is assigned with 3 tyoes of owner User Owner of the file
Guidelines/Techniques for Giving Interview ( For Interviewee) Prepare for the Interview. Anticipate questions and form answers. Research about the company. Make an Appropriate Appearance. Dress, neatness, right posture, facial expressions,
Types of Interviews 1. Structured Versus Unstructured Interviews In structured interview, the interviewer ( or a computer) asks a series of prepared questions in a set order. Structured interviews help