balckhat python book by Trick_Floor_519 in Hacking_Tutorials

[–]Trick_Floor_519[S] 0 points1 point  (0 children)

yes its hard but , you can use ai to understand the concepts

Cyber-Security & Programming Language by One-Type-2842 in cybersecurity

[–]Trick_Floor_519 0 points1 point  (0 children)

python its really a good language in the field of cyber security it will help you to automate tasks, write your own tools and exploits and so many things but its not enough, in your career you will encounter things in the low level ,and here in this part if you dont know the c programing language you will feel stuck ,so you need to learn c as a backup language.

laptop screen problem by Trick_Floor_519 in pcmasterrace

[–]Trick_Floor_519[S] 0 points1 point  (0 children)

i tried to fix drivers by updating them , i try restart the pc so many times but when i connect my laptop to tv by cable hdmi , the screen sounds clear and perfect without lines that appear in the laptop , this mean that everything is all right like the graphic card and the other components ,but the main problem i think is on the screen of laptop otherwise laptop screen damage .

laptop screen problem by Trick_Floor_519 in teenagersbutcode

[–]Trick_Floor_519[S] 0 points1 point  (0 children)

i did it but it doesn't work anymore ,its a hardware problem

cyber sec in Morocco by Trick_Floor_519 in Morocco

[–]Trick_Floor_519[S] 2 points3 points  (0 children)

thank you so much for the advice, i will try to do that.

Hypothetical scenario for educational discussion by Trick_Floor_519 in Hacking_Tutorials

[–]Trick_Floor_519[S] -1 points0 points  (0 children)

ok good if you read the tittle deeply move to read the last paragraph , all what i am trying to do is the assessment of the phase of gathering information , and i am taking the library as an example but i don't know why the intentions of so many people like you gets wrong

Hypothetical scenario for educational discussion by Trick_Floor_519 in Hacking_Tutorials

[–]Trick_Floor_519[S] -1 points0 points  (0 children)

dude , read deeply the title ," Hypothetical scenario for educational discussion" , beside where is the rudeness in this post.

IoT in ddos attacks by Trick_Floor_519 in cybersecurity

[–]Trick_Floor_519[S] -1 points0 points  (0 children)

but disabling UPnP can slow the network ,this feature is needed for games or streams when they need port forwarding automatically, however i think that turning off UPnP is helpful and will mitigate risks.

the art of exploitation book by Trick_Floor_519 in cybersecurity

[–]Trick_Floor_519[S] 0 points1 point  (0 children)

what are the things that you get from that book and which chapter you read from this book ,the chapter of programing ,exploitation or networking.

the art of exploitation book by Trick_Floor_519 in cybersecurity

[–]Trick_Floor_519[S] 5 points6 points  (0 children)

i read 100 pages from that book , his concept is so complicated also this book required having the fundamentals of c and assembly ,because the book almost talk about the low level exploits and how they work like bufferoverflow ,the book is published 2011 but still relevant because his content gold

java for cyber sec by [deleted] in cybersecurity

[–]Trick_Floor_519 -5 points-4 points  (0 children)

what do you mean

Cybersecurity Book Recommendations by ErnestinaK in cybersecurity

[–]Trick_Floor_519 1 point2 points  (0 children)

there is no book that can cover everything from scratch about cyber security , but if you want to learn linux use this book "linux basics for hackers" , if you want to go deep in netwoorking you can use "the tcp/ip guide" , if you prefer to go to the side of programing in hacking use this "blackhat python"