Skip to content
Tuesday, Oct 7, 2025
ICT BYTE Logo

ICT BYTE

Tech News in Nepal | #1 Tech Blog

  • HOME
  • GADGETS
    • MOBILE
    • LAPTOPS
    • SMARTWATCH
    • TABLETS
  • EVENTS
  • NEPAL
    • Banking
    • B.Sc. CSIT
    • BCA
  • MCS
    • 1st Sem
      • Managerial Communication
      • Object Oriented Programming
      • Open Source Technology
      • Design and Analysis of Algorithm
    • 2nd Sem
    • 3rd Sem
    • 4th Sem
  • Hult Prize
  • Utility Tools

Tag: mcs cyber security notes

System Hacking. Here is how your system can be hacked
Masters of Computer ScienceCyber Security

System Hacking. Here is how your system can be hacked

What is system hacking? System hacking is defined as the compromise of computer systems and software to access the target…

byICT Byte
Cyber Security Vulnerability Assessment
Masters of Computer ScienceCyber Security

Cyber Security Vulnerability Assessment

Vulnerability analysis is the next phase of Ethical hacking to identify the security holes or vulnerabilities in your system or…

byICT Byte
Enumeration in Cyber Security! Everything that you need to understand.
Masters of Computer ScienceCyber Security

Enumeration in Cyber Security! Everything that you need to understand.

What is Enumeration? In the enumeration phase, attacker creates active connections to system and performs directed queries to gain more…

byICT Byte

Copyright © 2025 ICT BYTE | Expose News by Ascendoor | Powered by WordPress.