TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.net·Aug 16, 2022Cross-Site Scripting Vulnerabilities in Elementor Impact Over 65 Million Websites - CVE-2022-29455Introduction WordPress is used by more than 60 million websites, including 33.6% of the top 10 million websites as of February 2022, WordPress is one of the most popular content management system solutions in use. These third-party components pose a ...Discuss·2 likesElementor
Buddika chathuranga alwisforNIBM Computing Societynibmcs.hashnode.net·Apr 4, 2023The impact of Artificial Intelligence on IT: Challenges and opportunitiesIntroduction to AI and IT Artificial intelligence (AI) is a rapidly evolving technology that is transforming a variety of industries, including the field of information technology (IT). AI refers to the development of computer systems that can perfor...Discuss·2 likesai
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.net·Aug 16, 2022A Heap Buffer Overflow in the Linux Kernal Leads to Root Privileges - CVE-2022-34918I presented a vulnerability found within the Netfilter subsystem of the Linux kernel. During my investigation, I found a weird comparison that does not fully protect a copy within a buffer. It led to a heap buffer overflow exploited to obtain root pr...Discuss·1 likecybersecurity
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.net·Apr 24, 2023Getting Started with the Internet of Vehicles Security - CAN SimulationIntroduction Internet of Vehicles security is currently a popular development direction, but most people are stuck here because its entry threshold is too high (no real car). So I summed up the relevant information on the Internet and wrote this arti...Discuss#cybersecurity
Mariam ElsehrawyforMariam + five things.mariamplusfive.hashnode.net·Apr 7, 2023A quick sip: Linux Access Control List - RedHat admin IIMotivation. Imagine you have a file on the system that carries important information about the department you are working in and you are starting to build a team to handle the job of this department, accordingly non of your coworkers have permission ...Discusslinux for beginners
Souhaibforsouhaib.hashnode.net·Apr 6, 2023How to choose a right career path in ITChoosing a career in IT can be a great option for university students who have an interest in technology and enjoy problem-solving. The field of IT is constantly evolving, with new advancements and opportunities emerging regularly. However, with so m...Discuss·30 readsCareer
Buddika chathuranga alwisforNIBM Computing Societynibmcs.hashnode.net·Apr 4, 2023The impact of Artificial Intelligence on IT: Challenges and opportunitiesIntroduction to AI and IT Artificial intelligence (AI) is a rapidly evolving technology that is transforming a variety of industries, including the field of information technology (IT). AI refers to the development of computer systems that can perfor...Discuss·2 likesai
Prithibi SahaforAbout Tech & DevOpstechopsprith.hashnode.net·Mar 16, 2023Let's Understand what is IT!Information Technology We all know that this is 2023 right! and these days we all are spending time with our smartphones, laptop and IoT devices instead of being outside with friends or colleagues. So these days increasing number of people in the wor...Discussinformation technology
LOKESH WAGHforlokeshwagh675.hashnode.net·Mar 11, 2023Introduction to Java--To understand java first of all we introduce OOP, oop means Object Oriented Programming, so why OOP is introduced? In earlier programming approaches there are certain limitations to overcome that limitation, programming introduced the new programmi...DiscussJava
Nandan KumarforNandan Kumar's Blogsirius93.hashnode.net·Feb 26, 2023Will Artificial Intelligence(AI) replace my job: An IT Engineer's perspective?Around the first week of this Month (Feb 23) I was invited as a guest speaker at a webinar by Coding Invaders by Mentorspro. I was invited there to guide people who want to switch to switch to IT careers and are looking at IT as an alternate career c...Discuss·218 readstechnology
Andrea ChiarelliforThe Turing Machineandychiare-1672850528353.hashnode.net·Feb 10, 2023Information, Computers, and... TelescopesIf you're a software developer or IT technician, chances are you've had a friend, acquaintance, or relative ask for your advice on their next computer's features. They may also ask you for suggestions on how to fix a problem with their printer or an ...Discuss·38 readsComputer Science
Natefornateh.hashnode.net·Jan 25, 2023Passing the Torch: The Importance of Senior IT Professionals Sharing Their KnowledgeAs technology continues to evolve and change at an unprecedented pace, the importance of senior IT professionals passing on their knowledge to the next generation cannot be overstated. With 30, 40, or even 50 years of experience in the field, senior ...Discuss·35 readsknowledge sharing
M B A R Kformbarkt3sto.hashnode.net·Jan 21, 2023Encryption vs HashingEncryption and hashing are both methods of protecting data, but they are used for different purposes and have some key differences. Encryption Encryption is a method of converting plaintext (readable data) into ciphertext (unreadable data) through th...Discuss·39 readsSecurity