疯狂的一点 image-src: Study.com Phishing Phishing is a type of an attack aimed at stealing personal data of the user in general by clicking on malicious links sent to the users via email or running malicious files on their computer. Phishing is used in the delivery phase of the cyber kill chain. In most cases, attackers use it to gain initial access. Spoofing
11/18/2022Say Hello Universe in Bash For sure, I do not want to go against the culture and start the series without a 'Hello world' kind of introduction. In this part of the series, I purpose to understand: [ ] Wtf is a shell -a computer shell for that matter? [ ] Who's Bash? [ ] How to write a bash script and make it executable [ ] Say Hello Universe in Bash.
9/20/2022Introducing the Bash scripting parts series. Hey, why don't we learn together? I am currently refreshing my bash scripting skills using Jay LaCroix's course on udemy. I am making notes, and I will be sharing them through my blog. It is a parts series, which I will updating as I write them. Induge and enjoy. :smiley:
9/20/2022The Environment Variables ❝ Don’t bury your burden in saintly silence. You have a problem? Great. Rejoice, dive in, and investigate. ❞ — Ven. Henepola Gunaratana What are environment variables? Variables and Constants are fundamental components of computer programming languages. Both represent unique memory locations containing data that programs use in their computations. Unlike constants, variables may change during execution. An environment variable is then a variable whose value is set outside the program and may change. Ordinarily, they are set through a functionality built into the operating system or microservice. An environment variable comprises a name/value pair, as in program-defined variables. Any number may be created and available for reference at a point in time.
9/20/2022or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up