Rahul Jamgade
Member
- Member since
- Jun 6, 2006
- Last active
- Aug 18, 2019
- Total activities
- 0
Activity feed
Recent contributions
-
#Threads
2394d277-8859-43f0-a57a-954773378b28
The IP address allocation is administered by IANA (Internet Assigned Numbers Authority).Every ISP is provided with IP address range which gets more...
-
#Threads
8abe2063-0d46-44cd-8f91-679b2f30c299
I have been Head of IT department for different companies. I had few girls that work under me. I would like to...
-
#Threads
c023d187-07a4-478b-8fa2-3bf0626c3034
Hi All,Being worked into the industry for long time and with my experience, I would like to to elaborate it a bit...
-
#Threads
30d57497-06f5-4b03-92b8-cc6b40478f56
Hi Meera,I  am not very sure about the issue that you have. Do you want to know about  type of...
-
#Threads
Series on Information Security - Weekly -Part 14
Vulnerability scanningA vulnerability is a hole or a weakness which can be a design flaw or an implementation bug, that allows an...
-
#Threads
42e8f379-c4f0-47e9-a2bb-535def7365cb
Hi Viswajith,Kaustubh has already made a good set of points . To add few more points, here you go. Cyber security is...
-
#Threads
Series on Information Security - Weekly -Part 13
The below mentioned concepts gives insight into how to identify the services and their version running on the servers so that it...
-
#Threads
ca410bdd-a4c4-4b81-84b8-0641d6263667
Hi Aanya,In general , people consider "Ethical Hacking" as "Cyber security". However it is much more than that.It has many components such...
-
#Threads
Series on Information Security - Weekly -Part 12
Back after a long gap of 4 months. Was working on something else. But now ready for weekly details  (No breaks...
-
#Threads
Series on Information Security - Weekly -Part 11
As a part of reconnaissance , one can use the the methods mentioned below. Websites that can be used to collect information...
-
#Threads
Series on Information Security -(Weekly) - Phases of Hacking- Part10
Reconnaissance types can be categorized into two types: Active reconnaissance : The attacker interacts with the system by doing ping weep, port...
-
#Threads
Series on Information Security -(Weekly) - Phases of Hacking- Part9
Whenever we work on any project such as computer based application development, it will have different phases such as Planning, designing ,...