Threat Hunting vs Threat Intelligence

Threat Hunting Threat hunting can be labeled as a process that looking for any bad actors on the network connection actively. Threat hunting will be focusing on the process on […]

Julia Programming

Introduction In this post, I would like to share Julia Programming which is different in terms of interpreters used that been used in Python or Ruby. Some people will find […]

WebDav Review

In this post, I would like to talk about DavTest tools which can be found in Kali Linux. Before we go deeper into using DAVTest, we need to know about […]

Zone Transfer Security

Let’s start discuss Zone Transfer Security on this post. For those who are not familiar with DNS Zone Transfer, it is a process in which any DNS Server IP has […]