What is Smishing?

Pranav Bhardwaj
Updated on 17-Aug-2021 06:08:20

158 Views

We all would be aware of the term Phishing. Smishing is a kind of Phishing that uses mobile phones as its platform to collect all the personal details like bank account numbers or passwords. And as the name suggests already, they Phish through the text messages known as SMS in phone language, therefore, termed SMiShing. It is also sometimes referred to as text Phishing.SMS stands for short message services, and Smishing uses these text messages as most people trust phone messages more than an email because they think finding a phone number for some unknown person is complex compared to ... Read More

What is PDF Virus

Pranav Bhardwaj
Updated on 17-Aug-2021 06:04:48

424 Views

As we all know, the main factor that cyber attackers use to spread their malicious viruses is a huge user base. Currently, there is no better medium in sharing documents than sharing them in the form of PDF in terms of having a huge user base. And that's why PDF devices have become a prime target for cyber attackers to spread malicious viruses.Since Pdf also contains few dynamic elements, hackers can execute a code or program on your system. For example, it can have hidden or encrypted files or may include suspicious flash files. Also, since JavaScript is used here, ... Read More

Remove AmazonAWS Virus

Pranav Bhardwaj
Updated on 17-Aug-2021 06:02:58

419 Views

As the name suggests, Amazonaws is a cloud service provided by Amazon, which allows the website makers to host their hefty files or their large codes on the Internet. There are many companies that offer this kind of service, but Amazonaws is a legitimate domain owned just by Amazon.However, many hackers misuse it to display all the irrelevant and unwanted pop-ups to users working on the Internet, which is what is known as the Amazonaws virus.So, if you frequently get pop-ups from Amazonaws.com, it means that your system is infected by this virus and there is an adware or web ... Read More

Detect Spyware on an Android Device

Pranav Bhardwaj
Updated on 17-Aug-2021 06:01:33

385 Views

Spyware is a way in which someone can track you through your android phone by just installing software in it or can send you some third-party link on your phone through text message or email, or social media. When you click on that link, the application gets automatically downloaded without you being aware of it.However, there are a few steps or general signs which might help you to detect if there is any spyware present on your mobile or not. Here are those steps −Your device can hang more often and become very slow while working. This is generally because ... Read More

Node.js Base64 Encoding and Decoding

Mayank Agarwal
Updated on 16-Aug-2021 12:18:20

7K+ Views

The buffer object can be encoded and decoded into Base64 string. The buffer class can be used to encode a string into a series of bytes. The Buffer.from() method takes a string as an input and converts it into Base64.The converted bytes can be changed again into String. The toString() method is used for converting the Base64 buffer back into the string format.SyntaxBuffer.from(string, [encoding]) object.toString(encoding)ParametersThe parameters are described below:string − This input parameter takes input for the string that will be encoded into the base64 format.encoding − This input parameter takes input for the encoding in which string will be encoded and ... Read More

Node.js Util Format Method

Mayank Agarwal
Updated on 16-Aug-2021 12:14:39

2K+ Views

The util.format() method returns a formatted string that will use the first argument as a printf like format string. This format can also contain zero or more format specifiers. These specifiers can be replaced with the converted value from the corresponding argument.Following are some of the formatted specifiers:%s − String will be used to convert all values except bigInt, object and -0.%d − In this case, number will be used to convert all values except BigInt and symbo%i − parseInt(value, 10) will be used for all values except BigInt and symbol.%f − parseFloat(value) will be used for all values except Symbol%j − This format ... Read More

Node.js Util Callbackify Method

Mayank Agarwal
Updated on 16-Aug-2021 12:12:32

605 Views

The util.callbackify() method takes an async function as a parameter (or a function with Promise) and returns a function with the callback style. The callback will hold the rejection reason as the first parameter (or null in case of Promise) and the resolved value as the second parameter.Syntaxutil.callbackify(function)Parametersfunction − The input parameter for the async_function required for callback.Example 1Create a file "callbackify.js" and copy the following code snippet. After creating the file, use the command "node callbackify.js" to run this code.// util.callbackify() demo example // Importing the util module const util = require('util'); // Defining a simple async function ... Read More

Node.js HMAC Digest Method

Mayank Agarwal
Updated on 16-Aug-2021 12:10:41

1K+ Views

The Hmac class is one of the many utility classes that is used for creating the cryptographic HMAC digests. The Hmac.digest() method is used for calculating all the data that is updated using the Hmac.update() method. If encoding is provided, a string will be returned, else a buffer is returned.Syntaxhmac.digest( [encoding] )Parametersencoding − This input parameter takes input for the encoding to be considered while calculating hmac.Example 1Create a file "hmacDigest.js" and copy the following code snippet. After creating the file use, use the command "node hmacDigest.js" to run this code. Live Demo// Hmac.digest() Demo Example // Importing the crypto module ... Read More

Node.js Hash Copy Method

Mayank Agarwal
Updated on 16-Aug-2021 12:08:01

313 Views

The Hash class is one of the many utility classes that is used for creating the hash digests of data. The hash.copy() method creates a new Hash object that will contain a deep copy of the internal state of the current hash object.Syntaxhash.copy([options])Parametersoptions −This input parameter takes input to control the stream behaviour and therefore will contain the stream.tranformOptions.Example 1Create a file "hashCopy.js" and copy the following code snippet. After creating the file, use the command "node hashCopy.js" to run this code.// hash.update() demo Example // Importing the crypto module const crypto = require('crypto'); // Defining the hash ... Read More

Node.js util.inherits Method

Mayank Agarwal
Updated on 16-Aug-2021 12:04:46

575 Views

The util.inherits() method basically inherits the methods from one construct to another. This prototype will be set to a new object to that from the superConstructor.By doing this, we can mainly add some validations to the top of Object.setPrototypeOf(constructor.prototype, superConstructor.prototype).Syntaxutil.inherits(constructor, superConstructor)ParametersThe parameters are described below -constructor − This is a function type input that holds the prototype for constructor the user wants to be inherited.superConstructor − This is the function that will be used for adding and validating the input validations.Example 1Create a file "inherits.js" and copy the following code snippet. After creating the file, use the command "node inherits.js" to run ... Read More

Advertisements