Rahul Jamgade

Rahul Jamgade

Member

Member since
Jun 6, 2006
Last active
Aug 18, 2019
Total activities
0

Activity feed

Recent contributions

  1. #Threads

    2394d277-8859-43f0-a57a-954773378b28

    The IP address allocation is administered by IANA (Internet Assigned Numbers Authority).Every ISP is provided  with IP address range  which gets more...

  2. #Threads

    8abe2063-0d46-44cd-8f91-679b2f30c299

    I have been Head of IT department for different companies. I had few girls that work under me. I would like to...

  3. #Threads

    c023d187-07a4-478b-8fa2-3bf0626c3034

    Hi All,Being worked into the industry for long time and with my experience, I would like to to elaborate it a bit...

  4. #Threads

    30d57497-06f5-4b03-92b8-cc6b40478f56

    Hi Meera,I  am not very sure about the issue that you have. Do you want to know about  type of...

  5. #Threads

    Series on Information Security - Weekly -Part 14

    Vulnerability scanningA vulnerability is a hole or a weakness which can be a design flaw or an implementation bug, that allows an...

  6. #Threads

    42e8f379-c4f0-47e9-a2bb-535def7365cb

    Hi Viswajith,Kaustubh has already made a good set of points . To add few more points, here you go. Cyber security is...

  7. #Threads

    Series on Information Security - Weekly -Part 13

    The below mentioned concepts gives insight into how to identify the services and their version running on the servers so that it...

  8. #Threads

    ca410bdd-a4c4-4b81-84b8-0641d6263667

    Hi Aanya,In general , people consider "Ethical Hacking" as "Cyber security". However it is much more than that.It has many components such...

  9. #Threads

    Series on Information Security - Weekly -Part 12

    Back after a long gap of 4 months. Was working on something else. But now ready for weekly details  (No breaks...

  10. #Threads

    Series on Information Security - Weekly -Part 11

    As a part of reconnaissance , one can use the the methods mentioned below. Websites that can be used to collect information...

  11. #Threads

    Series on Information Security -(Weekly) - Phases of Hacking- Part10

    Reconnaissance types can be categorized into two types: Active reconnaissance : The attacker interacts with the system by doing ping weep, port...

  12. #Threads

    Series on Information Security -(Weekly) - Phases of Hacking- Part9

    Whenever we work on any project such as computer based application development, it will have different phases such as Planning, designing ,...

  13. #Threads

    Series on Information Security -(Weekly) - DoS Attack- Part8

    Denial of Service​ Denial of Service or Dos attack is a type of attack where the resources are consumed in a wrongful...

  14. #Threads

    Series on Information Security -(Weekly) - Part7

    Attacks ​ An Attack is an attempt of getting unauthorized access to computer resources bypassing the security mechanism. There are two types...

  15. #Threads

    Series on Information Security -(Weekly) - Part6

    Though in day to day language we use the terminology "Hacker" for every kind of hacking activities that takes place but the...

  16. #Threads

    Series on Information Security -(Weekly) - Part5

    Earlier one needs to have a good in-depth knowledge of the subject, whether it is telephone systems, TCP/IP protocol, Operating systems, Network...

  17. #Threads

    Series on Information Security -(Weekly) - Part4-Introduction to Hacking

    Let us talk about the early hackers to understand what is hacking . John Drapper also known as Captain Crunch is one...

  18. #Threads

    Series on Information Security (Weekly) - Part3

    Laws and Regulation for Information Technology ​To deal with information security related issues, different countries have adopted different laws to counter the...

  19. #Threads

    Series on Information Security (Weekly) - Part2

    Controls for Information Security​ Security controls are safeguards or countermeasures to minimize the security risks. These controls basically restrict access...

  20. #Threads

    Series on Information Security (Weekly) - Part1

    In today's world, IT security is extremely important . However it is also the most ignored area due to lack of understanding...

  21. #Threads

    2f5209ec-63a2-407f-b359-8eeaf04b51af

    Kaustubh KatdareIs this specific to any version of Bluetooth? How does Bluetooth 5 handle this?As per the company, all devices with Bluetooth...

  22. #Threads

    Be Cautious! Devices with BlueTooth can be Hacked without interaction, including mobile phones.

    Armis Labs has found out a major vulnerability in mobile, desktop, and IoT operating systems that has bluetooth connections enabled. It includes...

  23. #Threads

    d9a3629a-2dd0-4a7b-b62e-6c1ac7727ec8

    Cryptocurrency is there to stay for a long time. Specially as it has features like secure transactions and anonymity. Also it is...

  24. #Threads

    9ade244b-0fce-4118-ac97-aeb5c6fe3f99

    Kaustubh KatdareThanks, #-Link-Snipped-# . Is there any way to address this issue if the firmware upgrade is not available?Not Really at this...

  25. #Threads

    Beware...Wifi Network with WPA2 is compromised!

    This attack is known as KRACK (Key Reinstallation Attacks).The attack is discovered by Mathy Vanhoef and Frank Piessens of imec-DistriNet, KU Leuven...

  26. #Threads

    f18af704-ef2b-4bcd-b68b-e6316e4d4411

    Ankita KatdareSince it is one of the most important questions that has been left unanswered, I thought I should list down my...

  27. #Threads

    51cbb162-6efe-4aae-aea2-d06a204c1fbc

    doing CCNA is helpful as it helps to understand basics.getting into network engineer job would also help.later go with specialization as per...

  28. #Threads

    6b8b8383-a3cb-4ac4-b124-c2c0b15ed54b

    not much of programming required.Softwares are available to do forensic work.Its different than networking.At times may need to do reverse engineering but...

  29. #Threads

    71c67962-53c5-48d0-a46e-b5782abf27ad

    one should have good understanding of Networking and Systems. If you have some experience in this field , its better. One can...

  30. #Threads

    0c4c7d68-883c-400e-9659-39d00ac3b241

    It is recommended that you go for any security courses when you have sufficient understanding and hands-on of the subject. Even certifications...

  31. #Threads

    97046a52-ce65-42fd-b070-eb5caa1fb9cf

    As per Union ministry of information technology, we require 5 lakh Cyber Security professionals by 2015.

  32. #Threads

    fcd5cb59-7196-425c-8b9e-53064af18dd1

    Have a WPA password of around 12 characters. Hence very rare possibility to get hacked. Disabling SSID broadcast and MAC filtering may...

  33. #Threads

    Phases of Hacking

    There is a certain procedure or steps that the hacker follows to carry out his activities. These are better known as phases...

  34. #Threads

    fa08249a-e90a-43df-9e5f-94c89d2a676d

    Hi, The term is used with ISDN lines. There are two ways of implementation called BRI (Basic Rate interface)and PRI (Primary rate...

  35. #Threads

    ecb0d8c3-6b76-4f57-ac35-d4afaeaf77cc

    The_Big_KPhone hacking was even popular in the silicon valley in 1970s. Apple co-founder Steve Wozniak mentions how he and his friends would...

  36. #Threads

    History of Hacking

    Indeed there were other relevant stories associated with the History of Hacking.Here are few of them that are well known. John Drapper...

  37. #Threads

    CIA of Cyber Security

    Nowadays almost everyone is someway or the other using information technology for their day to day activities. However we are Unaware and...

  38. #Threads

    b18d158f-644e-4e84-9f9e-31cae6df16aa

    Just for better understanding! Having a complicated password or secure password can act as deterrent at an instance. It does not however...

  39. #Threads

    3adee532-9e03-4170-9f88-bcbe1782207d

    Shivani.bhupalI am a beginner on this concept of hacking...And i am really seroiusly interested in CYBER CRIME and CYBER SECURITY.Can you please...

  40. #Threads

    c7b01787-ea0a-4464-ab09-cd77dac9642e

    The IT ACT 2000 LAW is very tough. There are many sections , few fall under Penalties (Section 43,44 and 45) which...

  41. #Threads

    a19b8d43-6fb4-40f8-a135-0853c768cc21

    Cyber Law in a good field to opt for in the current as well as upcoming world not far (2-3 years). the...

  42. #Threads

    1f0ea168-f643-4292-9a54-79fb5472a11b

    Hi Guys, Hacking is like exploring possibilities of a system so that it behaves the way it should not. Getting a software...

  43. #Threads

    d25cf5a4-f4cd-46d4-9965-ec29e85b8b3c

    The idea sounds good , but it hardly matters if you have single or multiple operating system running on the computer.there are...

  44. #Threads

    ff6d310a-26f8-442d-b6b0-43eca1963faa

    Cyber war is against a nation rather than individuals. There is a complete machinery that works befind the cyber warfare. Though may...

  45. #Threads

    2e9f9805-895a-48c7-906b-28070e5542b6

    The_Big_KCEans, I'm currently exploring the possibilities of having the whole site work on https than on http. But my knowledge of the...

  46. #Threads

    630ddaf6-9ad6-4997-87ef-9d783720726a

    1. In non-vlan scenario it will work provided that the PC1 and PC2 have same ip address range i.e. network address (subnet)...

  47. #Threads

    6b840889-84f6-4e49-9ecb-84823f36a181

    😀 One Antivirus at a time . Hope that helps

  48. #Threads

    4b83db24-26f1-48e2-987d-c2f5ebfb7f67

    Praveen-KumarHaving more than one antivirus might cause the system to collapse, as each act differently and its just like one bus driven...

  49. #Threads

    1b69ac61-db4d-4a2f-a9dd-d45fd4184327

    UnseenAcornI am currently working on a laptop with Windows 7 as the OS. The problem was that upon booting into the OS...

  50. #Threads

    72c48420-68e7-42bb-9145-4c6ad878d6cd

    😀 If I can elaborate a bit. The original meaning of Hacking is "an activity that explores a device or system so...

  51. #Threads

    19c50d0b-9947-4a0a-852f-645a30938ccb

    It is not difficult to break into the wpa2 system. However with the proper hardware and software tools in place. The best...

  52. #Threads

    8b784f3d-2c6d-4130-ad81-26bbb01887fe

    Guys, Let me through some light on wireless security. WEP is a basic level of encryption and breaking it will take 5...

  53. #Threads

    523270ba-5c27-41e5-9955-c1bdb51ea82f

    Here are few ideas, 1. Protecting network sniffing on corporate / company networks. 2. Protecting network from footprinting/reconnaissance. 3. Web Application...

  54. #Threads

    60b45cda-0e1a-4820-86e3-106c4d57c4d8

    You can work with Corporates by doing these courses with their legal team. But at the same time it is important to...

  55. #Threads

    acd51711-e6b8-4d68-94c9-31086fd8d4c4

    I am not sure if I answer your question. But to give some details, You can learn cyber laws for different reasons...

  56. #Threads

    9df3d9b7-26f0-4880-bd22-bb81880980c7

    aashimaIf that's a true news, BINGO!! Indians don't much believe in retaliating and reverting back!! When they didn't do anything for 26/11,...

  57. #Threads

    e48fc0e1-86e0-4dd5-9823-af31e211a63e

    gautam2503ok... got proxy n firewall..but can anyone tell me how to bypass a server which is using a proxy as well as...

  58. #Threads

    51b00afc-0177-42d7-9ac9-ffd02c82b93e

    Praveen-KumarIf you are saying this: #-Link-Snipped-# Then it works only in Windows 2000 Server!!! Please check and revert back... 😀Well there are...

  59. #Threads

    1c13f75e-8f04-4b06-ade7-df4d799c754d

    Praveen-KumarDDoS is Distributed Denial of Service attack. To explain it in simple words, you send many requests to a server and they...

  60. #Threads

    b46317ec-7d9d-4bf4-b4bd-45cc348ce27a

    vishalhakOf course, I am very keen to know what is behind SAM😎The SAM database stands for Security Account Manager and its stores...

  61. #Threads

    484e9e85-e99b-4296-a829-acaa46645cbf

    durgaNetwork devices till now have been very loclised to the fucntionalities they perform. for example the L2 devices are called switches(MAC address)...

  62. #Threads

    Network Security information

    In today’s IT world it is very important to understand the necessity of security of network security and data protection. To protect...

  63. #Threads

    d1f6f759-a625-4a72-b19e-1fa5d1cbe42b

    If it is heavily infected with Virus then good solution is to have it formatted. The reason is even if you remove...

  64. #Threads

    7e92f5b5-9e86-47dc-a79d-0328a51c29ba

    It happens when you don't have access to resource that you are trying to access. It is generally an authorization issue. May...

  65. #Threads

    9fd79796-336b-4c9b-9011-a405a1457fbd

    Hi , Here are the details, VLAN: It is group of computers that can have same broadcast domain. So the group of...

  66. #Threads

    371417c5-1d49-46ba-b807-41ae52752f84

    There are tools that are available. One of them is Snort.

  67. #Threads

    81674542-9a4e-4fdc-bf9f-fbb0591b0411

    Yes , there are ways to decode the SAM file at least for the password.

  68. #Threads

    4f0fd510-b7b5-4b3f-a2a0-4cbdaf73ad32

    Hi , Proxy server is a server that does not allow direct contact between the client (not necessarily a browser) and the...

  69. #Threads

    4f194606-ab22-40fc-b2fd-b63174383bc1

    Hi, Windows and Linux are diffrent in many ways, But to note fw of them are, 1) Windows installation needs a bulky...

  70. #Threads

    df4cb3cd-e980-4dd2-a215-46054d55685f

    Go to Registry (regedit) HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main lick on start page attribute, click to modiy it and change as per your need...

  71. #Threads

    342b9231-6a87-45b5-9b7a-3261c29a9573

    Can you let me know what is the kind of internet connectivity you have . May be direct Broadband modem,any application used...

  72. #Threads

    5d7c5c94-b516-4bad-a102-8cf6f5d923bc

    Hi, The hard drive is formatted in such a way that you can save data in a form of 512 Bytes chunk....