• Boot camps & training
  • Awareness & anti-phishing
  • Community
    • Topics
    • Certification Prep
    • Cyber Work
    • About us
    • Back
    • Industry insights
    • Phishing
    • Hacking
    • Capture the flag (CTF)
    • Professional development
    • Security awareness
    • Penetration testing
    • Cyber ranges
    • General security
    • Management & compliance
    • Malware analysis
    • MITRE ATT&CK™
    • News
    • Application security
    • Digital forensics
    • View all
    • Back
    • Back
    • (ISC)² CISSP
    • (ISC)² CCSP
    • (ISC)² CAP
    • Cisco CCNA
    • CMMC
    • CompTIA A+
    • CompTIA Network+
    • CompTIA Security+
    • CompTIA CySA+
    • CompTIA PenTest+
    • CompTIA CASP+
    • EC-Council CEH
    • ISACA CDPSE
    • ISACA CGEIT
    • ISACA CISA
    • ISACA CISM
    • ISACA CRISC
    • Microsoft Azure
    • PMP
    • View all
    • Back
    • Cyber Work Podcast
    • Cyber Work Live
    • Back
    • Contact us
    • Contributors

Aparajit i

Aparajit i has worked in IT Security for more than 10 years with varied experience. Finding newer methods for detection of malware is a passion. Spare time is reserved for tracking botnets, CnC servers and writing articles for Infosec. Contact via Twitter : @iaparajit

Secure coding August 1, 2014 Aparajit i

SWITCHING OVER TO NODEJS

When I started working on NodeJS, I had no prior experience nor knowledge about NodeJS nor about Javascript. It was kind of a painful journey, considering the...
Malware analysis October 9, 2013 Aparajit i

Portable Malware Lab for Beginners – Part 2

In the previous article, "Portable Malware Lab for Beginners," I spoke about nested virtual machines, i.e., deploying a virtual machine with QEMU and Cuckoo....
Digital forensics May 6, 2013 Aparajit i

Portable Malware Lab for Beginners

With the ever increasing cases of malware, many of the youngsters are switching over to analyzing malwares and its various aspects. A simple search in Google...
General security January 14, 2013 Aparajit i

Hide your Online Identity with Whonix

Going through Infosec articles provides us with useful insights into today's real world scenarios. This article can be treated as an extension of the previously...
Hacking November 27, 2012 Aparajit i

Common Myths about SQLi, Busted

Before going ahead with the topic of SQL injection, let us first take a look into the construct of a web-based application. Most websites have an inseparabe...
Infosec logo

Topics

Hacking Penetration testing Cyber ranges Capture the flag Malware analysis Professional development General security News Security awareness Phishing Management, compliance & auditing Digital forensics Threat intelligence DoD 8570 View all topics

Certifications

CISSP CCSP CGEIT CEH CCNA CISA CISM CRISC A+ Network+ Security+ CASP+ PMP CySA+ CMMC Microsoft Azure View all certifications

Careers

IT auditor Cybersecurity architect Cybercrime investigator Penetration tester Cybersecurity consultant Cybersecurity analyst Cybersecurity engineer Cybersecurity manager Incident responder Information security auditor Information security manager View all careers

Company

Contact us About Infosec Work at Infosec Newsroom Partner program
  • Infosec, part of Cengage Group — ©2023 Infosec Institute, Inc.
    • Trademarks
    • Privacy Policy