mobile theft and cell phone security techhhyme

Tips to Secure your Mobile Phone from being Stolen or Lost

Mobile phones have become an integral part of everybody’s life and the mobile phone has transformed from being a luxury to a bare necessity. Increase in the purchasing power and availability of numerous…

Read more
information security 365 days

365 Days of Information Security Quotes

Today’s IT systems have become widespread and integral part of our daily life. Online transactions, Online banking, Online purchases, Debit cards, Credit cards and Household bills is an important part of modern life….

Read more
Work From Home

Work From Home – Security Checklist

With the rise of remote work arrangements, ensuring the security of your work-from-home setup is more important than ever. Whether you’re a freelancer, remote employee, or entrepreneur, safeguarding your digital workspace is essential…

Read more
VPN Basics and Types of Cisco Devices VPN Techhyme

Basics of VPN and Types of Cisco VPN Devices

A virtual private network (VPN) is an extension of a network. It is virtual because it does not use reserved circuits. A VPN may pass over a circuit that is used only for…

Read more
computer security terms and definitions techhyme

A to Z – Computer Security Terms and Definitions

We all probably have an idea about what the word system means. For those of us who work in information technology, the term has become a catch-all that covers everything from an OS…

Read more
sqlmap commands tech hyme

Top SQLMAP Commands For Exploitation of SQL Injection

Structured Query Language, which is better known as SQL, is the underlining common programming language that is understood by most database management systems. It provides a common way for application to access the…

Read more
Hacking Phases Tech Hyme

From Reconnaissance to Covering Tracks – 5 Phases of Ethical Hacking

Hacking is an art or a technique which is used to find the solution for a typical problem by implementing either the legal or illegal ways. It may or may not be done…

Read more
Well Known Ports Tech Hyme

List of Commonly Used Well Known Ports

Well Known ports (also known as system ports) are numbered from 0 through 1023. In computer networking, the term port can refer to either physical or virtual connection points. Physical network ports allow…

Read more
security threats tech hyme

Top 10 Internet Security Threats

Computers and the Internet has become a very important part of our lives. It eases the tasks of our daily life in every way. Whenever we use the Internet for any purpose, we…

Read more
data communication and networking abbreviations a to z tech hyme

A to Z – Network Security Related Abbreviations and Terms

The simple fact of security is that you cannot do a very good job defending unless you first know what you are defending! Information technology resources span many different types of technologies and…

Read more
computer_security_abbreviations_techhyme

100+ Computer and Network Security Abbreviations

The term computer security and information security covers a wide array of activities in an organization/network. It includes not only the products, but also the processes used to prevent unauthorized access to, modification…

Read more

Protect Cisco Router with 8 Easy Steps

Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Honeypots are modifying the way people think about security. Companies are spending thousand of…

Read more
penetration testing methodology steps tech hyme

A 10-Step Penetration Testing Methodology – A Detailed Guide

This article takes you through a brief and basic penetration test of any company which primarily focuses on the actual attack and the recording of information found, rather than on the formal contractual…

Read more
web vulnerabilities index tech hyme

A to Z – Web Vulnerabilities Index – OWASP Standard

Vulnerability Assessment and Penetration Testing (VA/PT) provides enterprises with a more comprehensive application evaluation than any single test alone. Using the VA/PT approach gives an organization a more detailed view of the threats…

Read more
hacking_Security_Tools_Tech Hyme

A to Z – Cyber Security Tools Collection

Cyber Security tools are computer programs and scripts that help you find, exploit and secure vulnerabilities in computer systems, web applications, servers, and networks. There are many such tools available in the market….

Read more