Trending questions in Cyber Security & Ethical Hacking

+1 vote
1 answer

What should be in my resume to get a job in cybersecurity?

If you're thinking of transitioning into a ...READ MORE

Oct 25, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
454 views
+1 vote
1 answer

What is the best way to use APIs for DNS footprinting in Node.js?

There are several APIs that can help ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
760 views
+1 vote
1 answer

What is a better or more interesting future profession: cybersecurity or software developer/programmer?

When considering the future of cybersecurity versus ...READ MORE

Oct 25, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
410 views
+1 vote
1 answer

How worth it is the CISSP?

I passed through the process of achieving ...READ MORE

Oct 25, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
409 views
+1 vote
1 answer

Can a 42-year-old get into cybersecurity without an IT background?

Absolutely, you can break into the Cybersecurity ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
517 views
+1 vote
1 answer

How can I use PHP to securely handle user sessions and prevent session hijacking?

In order to securely handle user sessions ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
615 views
0 votes
0 answers

How do I use Python's subprocess to run multiple DNS queries in parallel?

I’m working on a Python script that ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
634 views
+1 vote
1 answer

Are Cybersecurity and Information Security the same thing?

Cybersecurity and information security are related but ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
422 views
+1 vote
1 answer
+1 vote
1 answer

Why is my brute-force attack on a web application failing after a few attempts?

If your brute-force attack is failing after ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
400 views
0 votes
0 answers

How do I write a simple PERL script to scan for open ports on a target machine?

I’m learning about network security and I ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
565 views
0 votes
0 answers

How can I implement basic input validation in Java to prevent common web vulnerabilities?

I’m working on a Java web application, ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
547 views
0 votes
0 answers

How can PHP be used to create a secure web application to prevent SQL injection?

I’m developing a web application using PHP, ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
454 views
0 votes
0 answers

How can I use JavaScript to create a basic keylogger for ethical hacking purposes?

I’m exploring ethical hacking techniques and I’ve ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
510 views
0 votes
0 answers

Why can't I obtain user token from a compromised API?

Why can't I obtain user token from ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
574 views
0 votes
0 answers

What should be in my resume to get a job in cyber security?

What should be in my resume to ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
464 views
0 votes
0 answers

Are cyber security and information security the same thing?

Are cyber security and information security the ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
422 views
0 votes
0 answers

Software Development vs Cyber Security

What is Software Development vs Cyber Security? READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

edited Oct 14, 2024 by Hoor 270 views
0 votes
0 answers

Can a 42-year-old get into cyber security without an IT background?

Can a 42-year-old get into cyber security ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
257 views
+1 vote
3 answers

Not able to install arpspoof

There is no package called arpspoof. To use the arpspoof command, ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,180 points
66,173 views
0 votes
1 answer

what is attack in cyber security

An "attack" or threat in cybersecurity refers ...READ MORE

Mar 1, 2024 in Cyber Security & Ethical Hacking by Roy
1,031 views
0 votes
1 answer

what is risk in cyber security?

In the context of cybersecurity, risk is ...READ MORE

Mar 1, 2024 in Cyber Security & Ethical Hacking by Shubh Saxena
850 views
0 votes
0 answers

what is ceh certification?

What is CEH certification? READ MORE

Feb 22, 2024 in Cyber Security & Ethical Hacking by Hoor
• 4,690 points
568 views
0 votes
1 answer

How to find password of a wifi using ubuntu 18.06?

To hack a wifi password using ubuntu: You ...READ MORE

Apr 24, 2020 in Cyber Security & Ethical Hacking by Kim

edited Oct 6, 2021 by Sarfaraz 42,040 views
0 votes
1 answer

what is meant by cyber security

The practice of cyber security threats preventing ...READ MORE

Feb 19, 2024 in Cyber Security & Ethical Hacking by pooja
• 24,450 points
712 views
0 votes
1 answer

What is CIA in Cybersecurity?

CIA(Confidentiality, Integrity, and Availability) represents the foundational ...READ MORE

Jan 22, 2024 in Cyber Security & Ethical Hacking by Beth
901 views
0 votes
1 answer

What is Cyber Ark?

CyberArk is a cybersecurity company that specializes ...READ MORE

Dec 15, 2023 in Cyber Security & Ethical Hacking by Preetham
989 views
0 votes
0 answers

How to be an Ethical Hacker?

What steps and guidelines should one follow ...READ MORE

Dec 19, 2023 in Cyber Security & Ethical Hacking by Saniya
• 3,360 points
480 views
0 votes
0 answers

what is ethical hacking course ?

Nov 29, 2023 in Cyber Security & Ethical Hacking by Evanjalin
• 36,180 points
554 views
0 votes
1 answer

what degree for cyber security

For a career in cybersecurity: Bachelor's Degree: Choose a ...READ MORE

Nov 3, 2023 in Cyber Security & Ethical Hacking by Rahul
860 views
0 votes
0 answers

How to learn Hacking on mobile?

What are the steps and resources for ...READ MORE

Nov 2, 2023 in Cyber Security & Ethical Hacking by Saniya
• 3,360 points
761 views
0 votes
1 answer

How to learn hacking for free?

Gaining ethical hacking skills without incurring any ...READ MORE

Oct 26, 2023 in Cyber Security & Ethical Hacking by anonymous
• 3,360 points
1,018 views
0 votes
1 answer

What is Computer Security?

Computer security, often referred to as cybersecurity, ...READ MORE

Oct 18, 2023 in Cyber Security & Ethical Hacking by anonymous
• 3,360 points
1,210 views
0 votes
1 answer

What is cyber security course?

A cybersecurity course is designed to equip ...READ MORE

Oct 26, 2023 in Cyber Security & Ethical Hacking by anonymous
• 3,360 points
900 views
0 votes
1 answer

Career in ethical hacking

To pursue a career in ethical hacking ...READ MORE

Oct 23, 2023 in Cyber Security & Ethical Hacking by Adarsh
833 views
0 votes
1 answer

Cyber Security

Cybersecurity protects: 1. Information: Shields data from unauthorized ...READ MORE

Oct 23, 2023 in Cyber Security & Ethical Hacking by anonymous
• 3,360 points
690 views
0 votes
1 answer

What is cia triad in cyber security?

The CIA triad, in the context of ...READ MORE

Oct 5, 2023 in Cyber Security & Ethical Hacking by anonymous
• 3,360 points
1,450 views
0 votes
1 answer

What is Information Security?

Information Security, often referred to as InfoSec, ...READ MORE

Oct 16, 2023 in Cyber Security & Ethical Hacking by anonymous
• 3,360 points
775 views
0 votes
1 answer

How to become an Ethical Hacker?

Steps and Requirements for a Career in ...READ MORE

Oct 12, 2023 in Cyber Security & Ethical Hacking by Saniya
• 3,360 points
827 views
0 votes
0 answers

what is cybersafe?

Could someone explain what cybersafe is and ...READ MORE

Oct 1, 2023 in Cyber Security & Ethical Hacking by Rajarshi
• 470 points

edited Oct 4, 2023 by Tanishqa 599 views
0 votes
0 answers

what is wireshark in cyber security ?

Could someone give a simple use case ...READ MORE

Sep 23, 2023 in Cyber Security & Ethical Hacking by anonymous
• 470 points
728 views
0 votes
0 answers

what does information security do

What are the primary functions and responsibilities ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
966 views
0 votes
0 answers

what is risk management in cyber security

What does 'risk management' entail within the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
963 views
0 votes
0 answers

what is cia triad in cyber security

What does the 'CIA Triad' represent in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
876 views
0 votes
0 answers

what does a cyber security analyst do

What are the primary responsibilities and roles ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
747 views
0 votes
0 answers

what is information security analyst

What does the role of an information ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
731 views
0 votes
0 answers

What is threat in cyber security

Hi, My company takes cybersecurity very seriously and ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
729 views
0 votes
0 answers

what does cybersecurity protect?

Sep 4, 2023 in Cyber Security & Ethical Hacking by Rajarshi
• 470 points
716 views
0 votes
0 answers

why is computer security important

What are the key reasons for the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
694 views