p o c k e t n o t e s

~online notebook~

Ego is the Enemy

Read more...

SecretShared Access to web application is controlled by a Username and password. At times we can see some websites requesting for OTP or one time password. A code in app ,SMS, Email. This works like an additional layer to prove user identity.

In this blog post will be exploring how OTP works. Exploring what standard says about this and few implementations.

Here is what's in rest of the blog,

Read more...

the_war_of_art

My view,

Read more...

Anything you want-Derek Sivers

My view

Read more...

WannaCry in Diamond Model

In this blog post, will explain how wanna cry ransomware event can be mapped with Diamond model.

Read more...

A rookie's reference to basic git commands,

Git Reference


Read more...

Diamond Model

Diamond model for intrusion analysis is used to analyze threats. It helps to set a structure and flow to threats so that analysts can control its effects. It may not be complete but sufficient enough to control the impact.

Read more...

CISSP Mind map

You might have already come across this quote, “Its a mile wide, inch deep” a common things to hear when somebody is preparing for CISSP exam.

Read more...

Here is a python code to start SimpleHTTPServer with an upload option.

Read more...

This blog post is continuation from Part01 and Part02.

Read more...

Enter your email to subscribe to updates.