#cybersecuritybbsr
Explore tagged Tumblr posts
Text

✅VMWARE: This industry-leading virtualization software provider needs little introduction, as its products and solutions have paved the way for a generation of virtualization technologies. ✅DOCKERS: The Docker project’s main intent is to allow developers to create, deploy, and run applications easier through the use of containers. Clearly—for DevOps and CI/CD initiatives—application portability and consistency are crucial needs that Docker fulfills quite nicely.
0 notes
Text

✅Cloud infrastructure refers to the hardware and software components
such as servers, storage, a network and virtualization software
✅These are needed to support the computing requirements of a cloud computing model.
0 notes
Text

Children are like buds in a garden and should be carefully and lovingly nurtured, as they are the future of the nation and the citizens of tomorrow. There can be no keener revelation of a society's soul than the way in which it treats its children.
.
#hackingmantra #cybersecuritybbsr #trainingbbsr #childrensday
0 notes
Text

✅One benefit of a bug bounty program is that it is continuous testing. A penetration test is typically a one-time assessment of your security at a point in time.
✅The Downsides to Bug Bounty program is it indiscriminately attract the attention of both blackhat and whitehat hackers.
#cybersecuritybbsr #trainingbbsr #hackingmantra #bugbounty #bughunting #technology
0 notes
Text

✅Different methods of bug bounty
1. OWASP Testing method
2. Penetration Testing
3. Jhaddix Bug Hunting Methodology
✅For mobile application bug hunting
1. iOS Application Security
2. Owasp Mobile AppSec
#cybersecuritybbsr #trainingbbsr #hackingmantra #bugbounty #bughunting
0 notes
Text

✅To become a bug bounty you have to have a knowledge of these topics
✅Cross-site scripting (XSS)
✅SQL Injection
✅Business Logic
✅Information Gathering
#cybersecuritybbsr #trainingbbsr #hackingmantra #bugbounty #bughunting
0 notes
Text

✅Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
✅Bug bounty program is offered by many websites and software developers can receive recognition and compensation for reporting bugs
#cybersecuritybbsr #trainingbbsr #hackingmantra #bugbounty #cybersecurity
0 notes
Text

✔️In freelancing if you spent almost 2–3 days doing freelancing I used to get around $100
✔️ If you got a bug in any bug hunting website within 300 seconds, which gave me $100. The choice is yours that work for 2 - 3 day and get $100 OR get the same in 300 seconds (5 mins)
#cybersecuritybbsr #trainingbbsr #hackingmantra #bugbounty #bughunting
0 notes
Text

✅Cloud analytics is a marketing term for businesses to carry out analysis using cloud computing.
✅It uses a range of analytical tools and techniques to help companies extract information from massive data and present it in a way that is easily categorized.
#hackingmantra #cybersecuritybbsr #trainingbbsr #cloudanalytics
0 notes
Text

✅Virtualization refers to the creation of a virtual resource such as a server, desktop, operating system, file, storage or network.
✅The goal is to manage workloads by radically transforming traditional computing to make it more scalable.
.
.
.
#hackingmantra #trainingbbsr #cybersecuritybbsr #virtualization
0 notes
Text

✅Cloud computing is a general term for anything that involves delivering hosted services over the Internet.
These services are broadly divided into three categories
✅Infrastructure-as-a-Service (IaaS)
✅Platform-as-a-Service (PaaS)
✅Software-as-a-Service (SaaS).
#cybersecuritybbsr #hackingmantra #trainingbbsr #cloudcomputing
0 notes