Rahul Jamgade
Member
- Member since
- Jun 6, 2006
- Last active
- Aug 18, 2019
- Total activities
- 0
Activity feed
Recent contributions
-
#Threads
2394d277-8859-43f0-a57a-954773378b28
The IP address allocation is administered by IANA (Internet Assigned Numbers Authority).Every ISP is provided with IP address range which gets more...
-
#Threads
8abe2063-0d46-44cd-8f91-679b2f30c299
I have been Head of IT department for different companies. I had few girls that work under me. I would like to...
-
#Threads
c023d187-07a4-478b-8fa2-3bf0626c3034
Hi All,Being worked into the industry for long time and with my experience, I would like to to elaborate it a bit...
-
#Threads
30d57497-06f5-4b03-92b8-cc6b40478f56
Hi Meera,I  am not very sure about the issue that you have. Do you want to know about  type of...
-
#Threads
Series on Information Security - Weekly -Part 14
Vulnerability scanningA vulnerability is a hole or a weakness which can be a design flaw or an implementation bug, that allows an...
-
#Threads
42e8f379-c4f0-47e9-a2bb-535def7365cb
Hi Viswajith,Kaustubh has already made a good set of points . To add few more points, here you go. Cyber security is...
-
#Threads
Series on Information Security - Weekly -Part 13
The below mentioned concepts gives insight into how to identify the services and their version running on the servers so that it...
-
#Threads
ca410bdd-a4c4-4b81-84b8-0641d6263667
Hi Aanya,In general , people consider "Ethical Hacking" as "Cyber security". However it is much more than that.It has many components such...
-
#Threads
Series on Information Security - Weekly -Part 12
Back after a long gap of 4 months. Was working on something else. But now ready for weekly details  (No breaks...
-
#Threads
Series on Information Security - Weekly -Part 11
As a part of reconnaissance , one can use the the methods mentioned below. Websites that can be used to collect information...
-
#Threads
Series on Information Security -(Weekly) - Phases of Hacking- Part10
Reconnaissance types can be categorized into two types: Active reconnaissance : The attacker interacts with the system by doing ping weep, port...
-
#Threads
Series on Information Security -(Weekly) - Phases of Hacking- Part9
Whenever we work on any project such as computer based application development, it will have different phases such as Planning, designing ,...
-
#Threads
Series on Information Security -(Weekly) - DoS Attack- Part8
Denial of Service Denial of Service or Dos attack is a type of attack where the resources are consumed in a wrongful...
-
#Threads
Series on Information Security -(Weekly) - Part7
Attacks An Attack is an attempt of getting unauthorized access to computer resources bypassing the security mechanism. There are two types...
-
#Threads
Series on Information Security -(Weekly) - Part6
Though in day to day language we use the terminology "Hacker" for every kind of hacking activities that takes place but the...
-
#Threads
Series on Information Security -(Weekly) - Part5
Earlier one needs to have a good in-depth knowledge of the subject, whether it is telephone systems, TCP/IP protocol, Operating systems, Network...
-
#Threads
Series on Information Security -(Weekly) - Part4-Introduction to Hacking
Let us talk about the early hackers to understand what is hacking . John Drapper also known as Captain Crunch is one...
-
#Threads
Series on Information Security (Weekly) - Part3
Laws and Regulation for Information Technology To deal with information security related issues, different countries have adopted different laws to counter the...
-
#Threads
Series on Information Security (Weekly) - Part2
Controls for Information Security Security controls are safeguards or countermeasures to minimize the security risks. These controls basically restrict access...
-
#Threads
Series on Information Security (Weekly) - Part1
In today's world, IT security is extremely important . However it is also the most ignored area due to lack of understanding...
-
#Threads
2f5209ec-63a2-407f-b359-8eeaf04b51af
Kaustubh KatdareIs this specific to any version of Bluetooth? How does Bluetooth 5 handle this?As per the company, all devices with Bluetooth...
-
#Threads
Be Cautious! Devices with BlueTooth can be Hacked without interaction, including mobile phones.
Armis Labs has found out a major vulnerability in mobile, desktop, and IoT operating systems that has bluetooth connections enabled. It includes...
-
#Threads
d9a3629a-2dd0-4a7b-b62e-6c1ac7727ec8
Cryptocurrency is there to stay for a long time. Specially as it has features like secure transactions and anonymity. Also it is...
-
#Threads
9ade244b-0fce-4118-ac97-aeb5c6fe3f99
Kaustubh KatdareThanks, #-Link-Snipped-# . Is there any way to address this issue if the firmware upgrade is not available?Not Really at this...
-
#Threads
Beware...Wifi Network with WPA2 is compromised!
This attack is known as KRACK (Key Reinstallation Attacks).The attack is discovered by Mathy Vanhoef and Frank Piessens of imec-DistriNet, KU Leuven...
-
#Threads
f18af704-ef2b-4bcd-b68b-e6316e4d4411
Ankita KatdareSince it is one of the most important questions that has been left unanswered, I thought I should list down my...
-
#Threads
51cbb162-6efe-4aae-aea2-d06a204c1fbc
doing CCNA is helpful as it helps to understand basics.getting into network engineer job would also help.later go with specialization as per...
-
#Threads
6b8b8383-a3cb-4ac4-b124-c2c0b15ed54b
not much of programming required.Softwares are available to do forensic work.Its different than networking.At times may need to do reverse engineering but...
-
#Threads
71c67962-53c5-48d0-a46e-b5782abf27ad
one should have good understanding of Networking and Systems. If you have some experience in this field , its better. One can...
-
#Threads
0c4c7d68-883c-400e-9659-39d00ac3b241
It is recommended that you go for any security courses when you have sufficient understanding and hands-on of the subject. Even certifications...
-
#Threads
97046a52-ce65-42fd-b070-eb5caa1fb9cf
As per Union ministry of information technology, we require 5 lakh Cyber Security professionals by 2015.
-
#Threads
fcd5cb59-7196-425c-8b9e-53064af18dd1
Have a WPA password of around 12 characters. Hence very rare possibility to get hacked. Disabling SSID broadcast and MAC filtering may...
-
#Threads
Phases of Hacking
There is a certain procedure or steps that the hacker follows to carry out his activities. These are better known as phases...
-
#Threads
fa08249a-e90a-43df-9e5f-94c89d2a676d
Hi, The term is used with ISDN lines. There are two ways of implementation called BRI (Basic Rate interface)and PRI (Primary rate...
-
#Threads
ecb0d8c3-6b76-4f57-ac35-d4afaeaf77cc
The_Big_KPhone hacking was even popular in the silicon valley in 1970s. Apple co-founder Steve Wozniak mentions how he and his friends would...
-
#Threads
History of Hacking
Indeed there were other relevant stories associated with the History of Hacking.Here are few of them that are well known. John Drapper...
-
#Threads
CIA of Cyber Security
Nowadays almost everyone is someway or the other using information technology for their day to day activities. However we are Unaware and...
-
#Threads
b18d158f-644e-4e84-9f9e-31cae6df16aa
Just for better understanding! Having a complicated password or secure password can act as deterrent at an instance. It does not however...
-
#Threads
3adee532-9e03-4170-9f88-bcbe1782207d
Shivani.bhupalI am a beginner on this concept of hacking...And i am really seroiusly interested in CYBER CRIME and CYBER SECURITY.Can you please...
-
#Threads
c7b01787-ea0a-4464-ab09-cd77dac9642e
The IT ACT 2000 LAW is very tough. There are many sections , few fall under Penalties (Section 43,44 and 45) which...
-
#Threads
a19b8d43-6fb4-40f8-a135-0853c768cc21
Cyber Law in a good field to opt for in the current as well as upcoming world not far (2-3 years). the...
-
#Threads
1f0ea168-f643-4292-9a54-79fb5472a11b
Hi Guys, Hacking is like exploring possibilities of a system so that it behaves the way it should not. Getting a software...
-
#Threads
d25cf5a4-f4cd-46d4-9965-ec29e85b8b3c
The idea sounds good , but it hardly matters if you have single or multiple operating system running on the computer.there are...
-
#Threads
ff6d310a-26f8-442d-b6b0-43eca1963faa
Cyber war is against a nation rather than individuals. There is a complete machinery that works befind the cyber warfare. Though may...
-
#Threads
2e9f9805-895a-48c7-906b-28070e5542b6
The_Big_KCEans, I'm currently exploring the possibilities of having the whole site work on https than on http. But my knowledge of the...
-
#Threads
630ddaf6-9ad6-4997-87ef-9d783720726a
1. In non-vlan scenario it will work provided that the PC1 and PC2 have same ip address range i.e. network address (subnet)...
-
#Threads
6b840889-84f6-4e49-9ecb-84823f36a181
😀 One Antivirus at a time . Hope that helps
-
#Threads
4b83db24-26f1-48e2-987d-c2f5ebfb7f67
Praveen-KumarHaving more than one antivirus might cause the system to collapse, as each act differently and its just like one bus driven...
-
#Threads
1b69ac61-db4d-4a2f-a9dd-d45fd4184327
UnseenAcornI am currently working on a laptop with Windows 7 as the OS. The problem was that upon booting into the OS...
-
#Threads
72c48420-68e7-42bb-9145-4c6ad878d6cd
😀 If I can elaborate a bit. The original meaning of Hacking is "an activity that explores a device or system so...
-
#Threads
19c50d0b-9947-4a0a-852f-645a30938ccb
It is not difficult to break into the wpa2 system. However with the proper hardware and software tools in place. The best...
-
#Threads
8b784f3d-2c6d-4130-ad81-26bbb01887fe
Guys, Let me through some light on wireless security. WEP is a basic level of encryption and breaking it will take 5...
-
#Threads
523270ba-5c27-41e5-9955-c1bdb51ea82f
Here are few ideas, 1. Protecting network sniffing on corporate / company networks. 2. Protecting network from footprinting/reconnaissance. 3. Web Application...
-
#Threads
60b45cda-0e1a-4820-86e3-106c4d57c4d8
You can work with Corporates by doing these courses with their legal team. But at the same time it is important to...
-
#Threads
acd51711-e6b8-4d68-94c9-31086fd8d4c4
I am not sure if I answer your question. But to give some details, You can learn cyber laws for different reasons...
-
#Threads
9df3d9b7-26f0-4880-bd22-bb81880980c7
aashimaIf that's a true news, BINGO!! Indians don't much believe in retaliating and reverting back!! When they didn't do anything for 26/11,...
-
#Threads
e48fc0e1-86e0-4dd5-9823-af31e211a63e
gautam2503ok... got proxy n firewall..but can anyone tell me how to bypass a server which is using a proxy as well as...
-
#Threads
51b00afc-0177-42d7-9ac9-ffd02c82b93e
Praveen-KumarIf you are saying this: #-Link-Snipped-# Then it works only in Windows 2000 Server!!! Please check and revert back... 😀Well there are...
-
#Threads
1c13f75e-8f04-4b06-ade7-df4d799c754d
Praveen-KumarDDoS is Distributed Denial of Service attack. To explain it in simple words, you send many requests to a server and they...
-
#Threads
b46317ec-7d9d-4bf4-b4bd-45cc348ce27a
vishalhakOf course, I am very keen to know what is behind SAM😎The SAM database stands for Security Account Manager and its stores...