Around 544 BC, a child named Sun Wu was born into a world of constant conflict and political turmoil. Little did anyone know that this boy would grow to become one of history’s most renowned military strategists, known to the world as Sun Tzu. Sun Wu’s early life was steeped in the art of warfare. Born […]
Category: Cyber Security
IP Spoofing Attack Types
I’ll explain some common IP spoofing attacks using stories and examples that are easy to understand. 1. Man-in-the-Middle (MitM) Attack Imagine you’re passing notes to your friend in class, but the class bully intercepts them and pretends to be both you and your friend. Story: Sarah and Tom were chatting online about planning a surprise party […]
Common Types of Denial of Service (DoS) Attacks
1. Volume-Based Attacks Imagine you’re trying to enter your favorite toy store, but suddenly a huge crowd of people rushes in, blocking the entrance. You can’t get in because there are too many people. That’s what a volume-based attack does to a website. Story: Little Timmy’s school website crashed on the day report cards were posted. […]
Major Cyber Attack Types Explained
Here I will explain 20 major network attack types using analogies and stories. I will also provide simple ways to protect against each one. 1. Phishing Attack Imagine you’re fishing, but instead of catching fish, you’re trying to catch people’s secrets. That’s what phishing is like in the computer world. A Real Story: Little Timmy got […]
Test Basis
The source of information or examples of work products that is needed to write test cases. identify test conditions from which test cases can be derived. A test basis may require these informations :
How to Create Windows Installation Disk?
A step by step screen representation is provided below.
MBR or GPT & BIOS or UEFI
If you are trying to initiate a new disk or format your computer and when you prepare a USB drive to format your computer you will come up one or another of these options. You have to chose one. You cannot just go either one of them. An MBR boot disk must work with the […]
Vue Js Music Player App
Here a small vue app to play music online, the list is manuelly arranged. TO DO for this app can be creating a search bar and making the music list dynamic. View the end product : LInk : https://thirsty-meitner-361acf.netlify.app/ GitHub : https://github.com/altasismail/Mars-Attack_MusicPlayer To download the project : https://github.com/altasismail/Mars-Attack_MusicPlayer.git Live App view :
Wireshark and tcpdump
Wireshark and tcpdump are powerful tools used for network analysis and troubleshooting. To understand it better and visualise these tools, let’s dive into the details of Wireshark and compare it with tcpdump through a relatable story. The Tale of Two Network Detectives Imagine two detectives, Wanda (Wireshark) and Tom (tcpdump), who specialize in solving network […]
Proxy vs Reverse Proxy vs Load Balancer from TechWorld with Nana
Thank you Nana for clearly explaining the concepts and practices for Proxy, Reverse Proxy and Load Balancer. I wish you all the best. You add a great value to the community. Whether you are an engineer or just curious about how the internet works behind the scenes, in this video we will break down this […]