Rahul Jamgade

Rahul Jamgade

Member

Member since
Jun 6, 2006
Last active
Aug 18, 2019
Total activities
0

Activity feed

Recent contributions

  1. #Threads

    2394d277-8859-43f0-a57a-954773378b28

    The IP address allocation is administered by IANA (Internet Assigned Numbers Authority).Every ISP is provided  with IP address range  which gets more...

  2. #Threads

    8abe2063-0d46-44cd-8f91-679b2f30c299

    I have been Head of IT department for different companies. I had few girls that work under me. I would like to...

  3. #Threads

    c023d187-07a4-478b-8fa2-3bf0626c3034

    Hi All,Being worked into the industry for long time and with my experience, I would like to to elaborate it a bit...

  4. #Threads

    30d57497-06f5-4b03-92b8-cc6b40478f56

    Hi Meera,I  am not very sure about the issue that you have. Do you want to know about  type of...

  5. #Threads

    Series on Information Security - Weekly -Part 14

    Vulnerability scanningA vulnerability is a hole or a weakness which can be a design flaw or an implementation bug, that allows an...

  6. #Threads

    42e8f379-c4f0-47e9-a2bb-535def7365cb

    Hi Viswajith,Kaustubh has already made a good set of points . To add few more points, here you go. Cyber security is...

  7. #Threads

    Series on Information Security - Weekly -Part 13

    The below mentioned concepts gives insight into how to identify the services and their version running on the servers so that it...

  8. #Threads

    ca410bdd-a4c4-4b81-84b8-0641d6263667

    Hi Aanya,In general , people consider "Ethical Hacking" as "Cyber security". However it is much more than that.It has many components such...

  9. #Threads

    Series on Information Security - Weekly -Part 12

    Back after a long gap of 4 months. Was working on something else. But now ready for weekly details  (No breaks...

  10. #Threads

    Series on Information Security - Weekly -Part 11

    As a part of reconnaissance , one can use the the methods mentioned below. Websites that can be used to collect information...

  11. #Threads

    Series on Information Security -(Weekly) - Phases of Hacking- Part10

    Reconnaissance types can be categorized into two types: Active reconnaissance : The attacker interacts with the system by doing ping weep, port...

  12. #Threads

    Series on Information Security -(Weekly) - Phases of Hacking- Part9

    Whenever we work on any project such as computer based application development, it will have different phases such as Planning, designing ,...

  13. #Threads

    Series on Information Security -(Weekly) - DoS Attack- Part8

    Denial of Service​ Denial of Service or Dos attack is a type of attack where the resources are consumed in a wrongful...

  14. #Threads

    Series on Information Security -(Weekly) - Part7

    Attacks ​ An Attack is an attempt of getting unauthorized access to computer resources bypassing the security mechanism. There are two types...

  15. #Threads

    Series on Information Security -(Weekly) - Part6

    Though in day to day language we use the terminology "Hacker" for every kind of hacking activities that takes place but the...

  16. #Threads

    Series on Information Security -(Weekly) - Part5

    Earlier one needs to have a good in-depth knowledge of the subject, whether it is telephone systems, TCP/IP protocol, Operating systems, Network...

  17. #Threads

    Series on Information Security -(Weekly) - Part4-Introduction to Hacking

    Let us talk about the early hackers to understand what is hacking . John Drapper also known as Captain Crunch is one...

  18. #Threads

    Series on Information Security (Weekly) - Part3

    Laws and Regulation for Information Technology ​To deal with information security related issues, different countries have adopted different laws to counter the...

  19. #Threads

    Series on Information Security (Weekly) - Part2

    Controls for Information Security​ Security controls are safeguards or countermeasures to minimize the security risks. These controls basically restrict access...

  20. #Threads

    Series on Information Security (Weekly) - Part1

    In today's world, IT security is extremely important . However it is also the most ignored area due to lack of understanding...

  21. #Threads

    2f5209ec-63a2-407f-b359-8eeaf04b51af

    Kaustubh KatdareIs this specific to any version of Bluetooth? How does Bluetooth 5 handle this?As per the company, all devices with Bluetooth...

  22. #Threads

    Be Cautious! Devices with BlueTooth can be Hacked without interaction, including mobile phones.

    Armis Labs has found out a major vulnerability in mobile, desktop, and IoT operating systems that has bluetooth connections enabled. It includes...

  23. #Threads

    d9a3629a-2dd0-4a7b-b62e-6c1ac7727ec8

    Cryptocurrency is there to stay for a long time. Specially as it has features like secure transactions and anonymity. Also it is...

  24. #Threads

    9ade244b-0fce-4118-ac97-aeb5c6fe3f99

    Kaustubh KatdareThanks, #-Link-Snipped-# . Is there any way to address this issue if the firmware upgrade is not available?Not Really at this...