Blogs
December 16, 2020 / December 24, 2022 by Query
Introduction You might have read several of our other network security blogs covering topics that people in the cybersecurity field need to know. Now is an excellent time to talk about Distributed Denial of Service (DDoS). If you were to inspect the security landscape, you would find several instances where a cyberattack was not trying […]
Read more »
November 18, 2020 / February 16, 2023 by Query
Introduction DNS is a widely used phonebook system on the Internet. It is used simply to query the IP address associated with a humanly readable and memorizable name. But it is a lot more than that as this article explains. If you have not yet read our previous article do so here: DNS and its […]
November 11, 2020 / March 22, 2023 by Query
*Don’t have R installed yet? Read my previous article to learn how: Statistical Computing: Installing R and RStudio Introduction to R Language Click on File > New File > R Script What to expect? This blog will just give you pointers to R and kick start to “R”. Detailed R project documentation can be found […]
October 28, 2020 / March 22, 2023 by Query
“Statistical computing is the interface between statistics and computer science.” What is Statistical Computing? Computational statistics are statistics done with a computer. Everything from ML to the graphical model to the inverse eigenvalue problem is involved in statistical computing. Data analysis and statistical modeling techniques can be challenging, and computer software is the best way […]
October 21, 2020 / March 22, 2023 by Query
It’s the URL, stupid (me)! Consider a scenario. You are in a miserable situation where you accidentally clicked on some phishing link or scam URL. A long time ago, when the web was safe, and viruses, trojans, and worms were transmitted only by EXE or BIN files, we could rest assured that the virus scanner […]
October 14, 2020 / December 24, 2022 by Query
In the last article, Understanding the Elastic Stack, I broke down the various Elastic components (check it out for a quick refresher). Now we will use the REST API provided by Elasticsearch as the back-end for a simple project. But before, let us discuss why we want to use Elasticsearch REST API as back-end. The […]
Newsroom
October 11, 2020 / December 24, 2022 by Query
October 7, 2020 / March 22, 2023 by Query
Introduction We have all have heard of network analyzers or packet sniffers, Wireshark with its command-line counterpart Tshark, or tcpdump. This article explores how Linux’s command-line power, combined with the tcpdump lexical parser’s filter expressions, can be used for some complex networking debugging. If you are bored at home in these COVID times, how about […]
October 4, 2020 / December 24, 2022 by Query
September 23, 2020 / March 22, 2023 by Query
DNS – Do Not think it’s Simple In our recent series of articles, we talked about network security-related tools and techniques one needs to be aware of to build a cybersecurity career. Next, we will cover DNS and its related security implications! DNS, or Domain Name System, translates domain names to IP addresses, so your […]