Veitias Social Network Club Veitias Social Network Club
نتائج البحث
عرض كل النتائج
  • انضم إلينا
    تسجيل الدخول
    تسجيل
    البحث

البحث

إكتشاف أشخاص جدد وإنشاء اتصالات جديدة وصداقات جديدة

  • أخر الأخبار
  • استكشف
  • الصفحات
  • المجموعات
  • المناسبات
  • المدونات
  • سوق المنتجات
  • التمويل
  • مفاوضاتي
  • وظائف
  • الافلام
  • الألعاب
  • المطوريين
  • المنشورات
  • المقالات
  • المستخدمون
  • الصفحات
  • المجموعات
  • المناسبات
  • Nandini Verma
    2025-11-07 06:23:23 - ترجمة -
    How Hackers Gather Data | Footprinting Explained Step-by-Step

    In this video, we’ll walk you through:
    What is Footprinting and why it’s important
    Passive vs Active Footprinting
    Common tools like Whois, NSLookup, Maltego, and Shodan

    Watch Here: https://youtu.be/UnCtcMCcSPE?si=hDbFlcU4Rg72nLu7

    #Footprinting #EthicalHacking #InformationGathering #CyberSecurityAwareness #Reconnaissance #InfosecTrain #OSINT #HackingTechniques #CyberSecurityTraining #PenetrationTesting
    How Hackers Gather Data | Footprinting Explained Step-by-Step In this video, we’ll walk you through: ✅ What is Footprinting and why it’s important ✅ Passive vs Active Footprinting ✅ Common tools like Whois, NSLookup, Maltego, and Shodan Watch Here: https://youtu.be/UnCtcMCcSPE?si=hDbFlcU4Rg72nLu7 #Footprinting #EthicalHacking #InformationGathering #CyberSecurityAwareness #Reconnaissance #InfosecTrain #OSINT #HackingTechniques #CyberSecurityTraining #PenetrationTesting
    0 التعليقات 0 المشاركات 6873 مشاهدة 0 معاينة
    الرجاء تسجيل الدخول , للأعجاب والمشاركة والتعليق على هذا!
  • Nandini Verma
    2025-03-04 06:56:00 - ترجمة -
    Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking! [1/2]

    𝐀𝐠𝐞𝐧𝐝𝐚 𝐟𝐨𝐫 𝐭𝐡𝐞 𝐌𝐚𝐬𝐭𝐞𝐫𝐜𝐥𝐚𝐬𝐬
    𝐏𝐚𝐫𝐭 𝟏 : 𝐒𝐜𝐫𝐢𝐩𝐭𝐢𝐧𝐠 𝐟𝐨𝐫 𝐇𝐚𝐜𝐤𝐞𝐫𝐬
    Understanding the bash environment
    Introduction to variables
    Using functions
    Creating scripts to automate the tasks like scanning

    Watch Here: https://www.youtube.com/watch?v=Jtysh1hPduQ

    #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #VulnerabilityExploitation #PenTestingMastery #infosectrain
    Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking! [1/2] ➡️ 𝐀𝐠𝐞𝐧𝐝𝐚 𝐟𝐨𝐫 𝐭𝐡𝐞 𝐌𝐚𝐬𝐭𝐞𝐫𝐜𝐥𝐚𝐬𝐬 𝐏𝐚𝐫𝐭 𝟏 : 𝐒𝐜𝐫𝐢𝐩𝐭𝐢𝐧𝐠 𝐟𝐨𝐫 𝐇𝐚𝐜𝐤𝐞𝐫𝐬 👉 Understanding the bash environment 👉 Introduction to variables 👉 Using functions 👉 Creating scripts to automate the tasks like scanning Watch Here: https://www.youtube.com/watch?v=Jtysh1hPduQ #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #VulnerabilityExploitation #PenTestingMastery #infosectrain
    0 التعليقات 0 المشاركات 17658 مشاهدة 0 معاينة
    الرجاء تسجيل الدخول , للأعجاب والمشاركة والتعليق على هذا!
  • Infosec Train
    2025-02-26 07:49:49 - ترجمة -
    Advanced Penetration Testing: A Deep Dive—Master the Art of Ethical Hacking! [1/2]

    Advanced Penetration Testing: A Deep Dive (Part 1)—Master the Art of Ethical Hacking!" In this first part of the series, you will uncover expert tips, methods, and tools used by professional ethical hackers to assess and secure systems.

    Watch Now: https://www.youtube.com/watch?v=Jtysh1hPduQ

    #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #CyberThreats #NetworkSecurity #VulnerabilityExploitation #PenTestingMastery
    Advanced Penetration Testing: A Deep Dive—Master the Art of Ethical Hacking! [1/2] Advanced Penetration Testing: A Deep Dive (Part 1)—Master the Art of Ethical Hacking!" In this first part of the series, you will uncover expert tips, methods, and tools used by professional ethical hackers to assess and secure systems. Watch Now: https://www.youtube.com/watch?v=Jtysh1hPduQ #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #CyberThreats #NetworkSecurity #VulnerabilityExploitation #PenTestingMastery
    0 التعليقات 0 المشاركات 20035 مشاهدة 0 معاينة
    الرجاء تسجيل الدخول , للأعجاب والمشاركة والتعليق على هذا!
  • Nandini Verma شارك رابطًا
    2025-02-20 07:16:50 - ترجمة -
    Trojan Malware Tactics: Understanding the Key Concepts Behind the Malware

    Read Here: https://www.infosectrain.com/blog/trojan-malware-tactics-understanding-the-key-concepts-behind-the-malware/

    #TrojanMalware #CyberSecurity #MalwareAnalysis #CyberThreats #EthicalHacking #InfoSec #MalwareTactics #TrojanVirus #HackingTechniques #CyberAttack #ThreatIntelligence #CyberDefense #Ransomware #infosectrain
    Trojan Malware Tactics: Understanding the Key Concepts Behind the Malware Read Here: https://www.infosectrain.com/blog/trojan-malware-tactics-understanding-the-key-concepts-behind-the-malware/ #TrojanMalware #CyberSecurity #MalwareAnalysis #CyberThreats #EthicalHacking #InfoSec #MalwareTactics #TrojanVirus #HackingTechniques #CyberAttack #ThreatIntelligence #CyberDefense #Ransomware #infosectrain
    WWW.INFOSECTRAIN.COM
    Trojan Malware Tactics: Understanding the Key Concepts Behind the Malware
    In cybersecurity, understanding the threats is just as important as defending against them. Let’s understand one of the most malicious types of cyber threats: Trojans.
    0 التعليقات 0 المشاركات 16755 مشاهدة 0 معاينة
    الرجاء تسجيل الدخول , للأعجاب والمشاركة والتعليق على هذا!
  • Infosec Train أضاف صورة
    2025-02-04 13:08:55 - ترجمة -
    HOW DoS ATTACK WORKS?

    As the attack comes from a single source, it is generally easier to identify and block compared to the more complex Distributed Denial of Service (DDoS) attack, which involves multiple sources. The primary goal is to overwhelm and disrupt the system rather than to steal data.

    More Info: https://www.infosectrain.com/blog/demystified-ceh-module-10-denial-of-service-attack/

    #DoSAttack #CyberSecurity #DenialOfService #NetworkSecurity #CyberThreats #DoSPrevention #ThreatMitigation #ITSecurity #HackingTechniques #CyberDefense
    HOW DoS ATTACK WORKS? As the attack comes from a single source, it is generally easier to identify and block compared to the more complex Distributed Denial of Service (DDoS) attack, which involves multiple sources. The primary goal is to overwhelm and disrupt the system rather than to steal data. More Info: https://www.infosectrain.com/blog/demystified-ceh-module-10-denial-of-service-attack/ #DoSAttack #CyberSecurity #DenialOfService #NetworkSecurity #CyberThreats #DoSPrevention #ThreatMitigation #ITSecurity #HackingTechniques #CyberDefense
    0 التعليقات 0 المشاركات 10599 مشاهدة 0 معاينة
    الرجاء تسجيل الدخول , للأعجاب والمشاركة والتعليق على هذا!
  • Infosec Train
    2025-01-28 06:41:56 - ترجمة -
    Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking! [1/2]

    Advanced Penetration Testing: A Deep Dive (part 1) - Master the Art of Ethical Hacking!" takes you on a detailed journey into the world of advanced hacking techniques and cybersecurity. In this first part of the series, you will uncover expert tips, methods, and tools used by professional ethical hackers to assess and secure systems

    Watch Now - https://www.youtube.com/watch?v=Jtysh1hPduQ&t=64s

    #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #CyberThreats
    Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking! [1/2] Advanced Penetration Testing: A Deep Dive (part 1) - Master the Art of Ethical Hacking!" takes you on a detailed journey into the world of advanced hacking techniques and cybersecurity. In this first part of the series, you will uncover expert tips, methods, and tools used by professional ethical hackers to assess and secure systems Watch Now - https://www.youtube.com/watch?v=Jtysh1hPduQ&t=64s #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #CyberThreats
    0 التعليقات 0 المشاركات 8953 مشاهدة 0 معاينة
    الرجاء تسجيل الدخول , للأعجاب والمشاركة والتعليق على هذا!
  • Nandini Verma
    2025-01-27 05:58:49 - ترجمة -
    Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking!

    𝐀𝐠𝐞𝐧𝐝𝐚 𝐟𝐨𝐫 𝐭𝐡𝐞 𝐌𝐚𝐬𝐭𝐞𝐫𝐜𝐥𝐚𝐬𝐬
    𝐏𝐚𝐫𝐭 𝟏 : 𝐒𝐜𝐫𝐢𝐩𝐭𝐢𝐧𝐠 𝐟𝐨𝐫 𝐇𝐚𝐜𝐤𝐞𝐫𝐬
    Understanding the bash environment
    Introduction to variables
    Using functions
    Creating scripts to automate the tasks like scanning

    Watch Here: https://www.youtube.com/watch?v=Jtysh1hPduQ&t=64s

    #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #CyberThreats #NetworkSecurity #VulnerabilityExploitation #PenTestingMastery #infosectrain
    Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking! ➡️ 𝐀𝐠𝐞𝐧𝐝𝐚 𝐟𝐨𝐫 𝐭𝐡𝐞 𝐌𝐚𝐬𝐭𝐞𝐫𝐜𝐥𝐚𝐬𝐬 𝐏𝐚𝐫𝐭 𝟏 : 𝐒𝐜𝐫𝐢𝐩𝐭𝐢𝐧𝐠 𝐟𝐨𝐫 𝐇𝐚𝐜𝐤𝐞𝐫𝐬 👉 Understanding the bash environment 👉 Introduction to variables 👉 Using functions 👉 Creating scripts to automate the tasks like scanning Watch Here: https://www.youtube.com/watch?v=Jtysh1hPduQ&t=64s #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #CyberThreats #NetworkSecurity #VulnerabilityExploitation #PenTestingMastery #infosectrain
    0 التعليقات 0 المشاركات 13798 مشاهدة 0 معاينة
    الرجاء تسجيل الدخول , للأعجاب والمشاركة والتعليق على هذا!
  • Nandini Verma شارك رابطًا
    2024-03-22 11:09:50 - ترجمة -
    Types of Network Scanning for Ethical Hacking

    In the world of cybersecurity, ethical hacking plays a crucial role in identifying vulnerabilities and securing systems from potential threats. One of the key techniques used in ethical hacking is network scanning, which involves probing a network to discover active hosts, open ports, and services running on those ports. Understanding the different types of network scanning is essential for ethical hackers to conduct thorough security assessments and protect sensitive information from cyber attacks.

    Read Here: https://medium.com/@Infosec-Train/types-of-network-scanning-for-ethical-hacking-254de2876091

    #NetworkScanningMethods #EthicalHackingTechniques #CybersecurityScans #NetworkSecurity #EthicalHacking101 #NetworkVulnerability #InfoSecScanning #HackersToolkit #PenetrationTesting #SecurityAssessment #CyberDefense #infosectrain #learntorise
    Types of Network Scanning for Ethical Hacking In the world of cybersecurity, ethical hacking plays a crucial role in identifying vulnerabilities and securing systems from potential threats. One of the key techniques used in ethical hacking is network scanning, which involves probing a network to discover active hosts, open ports, and services running on those ports. Understanding the different types of network scanning is essential for ethical hackers to conduct thorough security assessments and protect sensitive information from cyber attacks. Read Here: https://medium.com/@Infosec-Train/types-of-network-scanning-for-ethical-hacking-254de2876091 #NetworkScanningMethods #EthicalHackingTechniques #CybersecurityScans #NetworkSecurity #EthicalHacking101 #NetworkVulnerability #InfoSecScanning #HackersToolkit #PenetrationTesting #SecurityAssessment #CyberDefense #infosectrain #learntorise
    MEDIUM.COM
    Types of Network Scanning for Ethical Hacking
    Network scanning for ethical hacking is essential as it helps identify potential vulnerabilities, misconfigurations, and weaknesses in a…
    0 التعليقات 0 المشاركات 16982 مشاهدة 0 معاينة
    الرجاء تسجيل الدخول , للأعجاب والمشاركة والتعليق على هذا!
  • Nandini Verma شارك رابطًا
    2024-02-23 07:31:26 - ترجمة -
    What is Google Hacking Database (GHDB)?

    Have you ever thought about how much information is out there on the internet? and how it can be accessed, used, and in some cases, misused? The Google Hacking Database is a collection of search queries, also known as Google Dorks, that can be used to find sensitive information exposed on the internet. GHDB is a resource for cybersecurity professionals and ethical hackers to uncover sensitive information. It provides search queries and techniques to find publicly accessible data.

    Read Here: https://infosec-train.blogspot.com/2023/12/what-is-google-hacking-database-ghdb.html

    #GHDB #GoogleHackingDatabase #InfoSecResearch #GoogleDorking #GoogleHacking #WebSecurity #CyberSecurity #OSINT #OpenSourceIntelligence #GoogleQueries #InfoSecTools #GHDBExplained #DigitalSecurity #TechHacking #SearchQueries #WebVulnerabilities #HackingTechniques #SecurityResearch #TechDiscovery #InfoSecInsights #GoogleSearch #CyberAwareness #ExploitationTesting #infosectrain #learntorise
    What is Google Hacking Database (GHDB)? Have you ever thought about how much information is out there on the internet? and how it can be accessed, used, and in some cases, misused? The Google Hacking Database is a collection of search queries, also known as Google Dorks, that can be used to find sensitive information exposed on the internet. GHDB is a resource for cybersecurity professionals and ethical hackers to uncover sensitive information. It provides search queries and techniques to find publicly accessible data. Read Here: https://infosec-train.blogspot.com/2023/12/what-is-google-hacking-database-ghdb.html #GHDB #GoogleHackingDatabase #InfoSecResearch #GoogleDorking #GoogleHacking #WebSecurity #CyberSecurity #OSINT #OpenSourceIntelligence #GoogleQueries #InfoSecTools #GHDBExplained #DigitalSecurity #TechHacking #SearchQueries #WebVulnerabilities #HackingTechniques #SecurityResearch #TechDiscovery #InfoSecInsights #GoogleSearch #CyberAwareness #ExploitationTesting #infosectrain #learntorise
    INFOSEC-TRAIN.BLOGSPOT.COM
    What is Google Hacking Database (GHDB)?
    In an age where data is highly valuable, knowing how our digital footprints or online activities can be monitored or how our data can be acc...
    0 التعليقات 0 المشاركات 18834 مشاهدة 0 معاينة
    الرجاء تسجيل الدخول , للأعجاب والمشاركة والتعليق على هذا!
© 2026 Veitias Social Network Club Arabic
English Arabic French Spanish Portuguese Deutsch Turkish Dutch Italiano Russian Romaian Portuguese (Brazil) Greek
الشروط الخصوصية اتصل بنا الدليل