Rahul Jamgade

Rahul Jamgade

Member

Member since
Jun 6, 2006
Last active
Aug 18, 2019
Total activities
0

Activity feed

Recent contributions

  1. #Threads

    2394d277-8859-43f0-a57a-954773378b28

    The IP address allocation is administered by IANA (Internet Assigned Numbers Authority).Every ISP is provided  with IP address range  which gets more...

  2. #Threads

    8abe2063-0d46-44cd-8f91-679b2f30c299

    I have been Head of IT department for different companies. I had few girls that work under me. I would like to...

  3. #Threads

    c023d187-07a4-478b-8fa2-3bf0626c3034

    Hi All,Being worked into the industry for long time and with my experience, I would like to to elaborate it a bit...

  4. #Threads

    30d57497-06f5-4b03-92b8-cc6b40478f56

    Hi Meera,I  am not very sure about the issue that you have. Do you want to know about  type of...

  5. #Threads

    Series on Information Security - Weekly -Part 14

    Vulnerability scanningA vulnerability is a hole or a weakness which can be a design flaw or an implementation bug, that allows an...

  6. #Threads

    42e8f379-c4f0-47e9-a2bb-535def7365cb

    Hi Viswajith,Kaustubh has already made a good set of points . To add few more points, here you go. Cyber security is...

  7. #Threads

    Series on Information Security - Weekly -Part 13

    The below mentioned concepts gives insight into how to identify the services and their version running on the servers so that it...

  8. #Threads

    ca410bdd-a4c4-4b81-84b8-0641d6263667

    Hi Aanya,In general , people consider "Ethical Hacking" as "Cyber security". However it is much more than that.It has many components such...

  9. #Threads

    Series on Information Security - Weekly -Part 12

    Back after a long gap of 4 months. Was working on something else. But now ready for weekly details  (No breaks...

  10. #Threads

    Series on Information Security - Weekly -Part 11

    As a part of reconnaissance , one can use the the methods mentioned below. Websites that can be used to collect information...

  11. #Threads

    Series on Information Security -(Weekly) - Phases of Hacking- Part10

    Reconnaissance types can be categorized into two types: Active reconnaissance : The attacker interacts with the system by doing ping weep, port...

  12. #Threads

    Series on Information Security -(Weekly) - Phases of Hacking- Part9

    Whenever we work on any project such as computer based application development, it will have different phases such as Planning, designing ,...