Today we are going to discuss about what is capture the flag, Who are they for, What are different types, What are the per-requisites and how to begin.
Everyone who is starting their cyber security journey has a goal in mind that one day he or she will be doing assessments of digital assets may it be networks, may it be web applications, may it be internet of things devices, mobile devices or etc to find vulnerabilities and patch them, soon we realize that such assets are complex infrastructures and we are intimidated by the stack of technologies working on…
Today we are going to discuss about what is cyber security, what are the essential components or per-requisites for cyber security, what is the mindset required and how to begin?
To understand the term cyber security we first need to understand the term hacking.
So what is Hacking?
Hacking is nothing but an art of manipulating things into doing what they are not meant for, for example a toy like a remote control car turned into a detonator that’s hacking, A website for placing orders online being used as a file hosting platform or better spilling out users personal data…
Today we are going to discuss about what is programming, what are different programming languages and how to get started.
So few months back a first year student from computer science stream called me and asked me about what language of programming he should learn because he was really confused about where to begin as there are so many options to choose from moreover he was bothered about how will he learn all these languages.
Then I laughed and remembered that I faced a similar problem when I was getting started to learn more about programming and development in general…
Finding better ways for brighter days.