Author: DICC Institute

18 June 2021

Buffer Overflow Attack and its Prevention

Buffer Overflow An information security or programming problem occurs when a programme writes data to a buffer but overshoots the buffer’s boundary, resulting in data overwriting memory locations that are adjacent to the buffer. Buffers are memory storage regions that temporarily hold data while it is being transferred from one location to another. As a result, the programme attempting to write the data to the […]

13 June 2021

How to use Shodan Search Engine?

Shodan is nothing but a popular search engine just like Google but the operation of this search engine is somewhat different from all other search engines. Through this search engine, we can simply search for internet-connected devices. This is established with the use of different kind of routers as well as servers to the internet of things (IoT) devices. The devices such as thermostat and […]

13 June 2021

How does Darkside Ransomware work?

Many of us are unaware of some very important cybersecurity technology or topics that have a great impact on our day to day lives. Knowing these technologies help us to be safe from all the new threats going on as having sufficient information can make us know about how these threats work and of course how can someone come out from a worst situation like […]

11 May 2021

Stock Market Crash Reasons and Implications

Let’s start this article by knowing the exact definition of the stock market and stock market crash. Well as many of us are already aware of the fact that the stock market is nothing but an aggregation of buyers as well as sellers of stocks which often represent ownership claims on a various business proposal. This market is also known as the equity market, share […]

5 April 2021

How to learn Ethical Hacking from the basics

The field of hacking is been around us for the last five decades and it would be not wrong if I say that the domain is of great importance in every other field that holds something in this new era. The security related to every piece of information is of broad discipline. All this covers a large range of topic altogether. The first event of […]

4 April 2021

Learning Stock Market for Beginners

In recent times young minds have started finding a lot of interest in the stock market and its related domains. This is the reason people are always trying to find the best method through which one can start their journey in this field. Proper guidance is, however, the initial requirement as without it you may end up doing some mistakes that can cause you a […]

21 March 2021

Stock Market outlook 2021

The Indian stock market outlook as with February has been comparatively come up with low-interest rates as expected. These low-interest rates are globally and optimism around all the present vacancies. There is a pro expansionary budget being provided so that the floor of valuation becomes quite easy to be explored. This is however done most of the investigation related to the earning growth of the […]

4 March 2021

Leading and Lagging Indicators

All kind of technical analysis mainly revolves around indicators whether you are a day or a shift trader the fact remains the same. As we are aware that without technical indicators it is not possible to get information regarding price actions, market trends and charts patterns and so much more. These technical indicators are broadly classified into two broad categories which are leading and lagging […]

21 February 2021

Digital marketing tools 2021

Setting up a business nowadays has not been so easier when we look at the past years. There are so many tools present through which the newcomers can start up their business, give it a new look from anywhere and at any time they want. This is one of the reasons why the concept of a startup is becoming more and more popular in the […]

21 February 2021

Tools for hacking IoT devices

The field of IoT (Internet of Things) and the embedded devices is presently becoming a challenge for ethical hackers around the globe. They have been trying to understand the concept of this field and the related vulnerabilities these devices have. So, if a person wants to hack these IOT interfaces or I can say the integrated application that is a must that he possesses an […]