Sometimes when running through a CSV or any kind of a log file, you may encounter lists with a lot of duplicates. I will show an example of the simplest order here. Say, you have a duplicates.txt that goes one two three one four two four Now, how to remove duplicates from a list such […]
Continue ReadingAuthor: Ajit Gaddam
Unix Shell for Windows
A lot of us who use Linux at work/school or have always grown up using Unix commands and using the Unix shell for years and more often than not, there are instances where a ls command comes more naturally than the dir command at the command prompt when using Windows. For the most part, a […]
Continue ReadingNetwork Security Risk Assessment
In this article, I will introduce you to some well known tools which security analysts use for Network Security Risk assessment, to know more about the layout of the network they are trying to test and also gather intelligence about that company, which the security analyst can use later on to conduct further tests and […]
Continue ReadingImportant Computer Security Terms and Terminology
This article lists some Computer Security Terms and Computer Security Terminology. For anyone reading any of the computer security terms below for the first time, I highly recommend that you Google these keywords and learn more about them. Adware: The difference between Adware and Spyware is very subtle. Both Adware and Spyware is installed without […]
Continue ReadingWordPress Security Tips to protect your WordPress Blog
While WordPress in general is pretty secure grounds up, it is still vulnerable to the many kinds of security exploits out there. WordPress Security Tip # 1: Upgrade your WordPress Blog Keeping your WordPress blog up to date by installing the latest version of WordPress. You may think it is pain to update every time, […]
Continue Reading