Bhavesh Jangale
Bhavesh Jangale
1 year ago
Lots off expectation from this movie... Jazba vs prdp. Sallu bhaiii😍
Bhavesh Jangale
2 years ago
How to find a Vulnerable Website?
Common Methods used for Website Hacking  There are lots of methods that can be used to hack a website but most common ones are as follows: 1.SQL Injection 2.XSS(Cross Site Scripting) 3.Remote File Inclusion(RFI) 4.Directory Traversal attack 5.Local File inc...

How to find a Vulnerable Website?
bprince001.blogspot.com
Bhavesh Jangale
2 years ago
Your Facebook can be ‪#‎hacked‬ in 18 ways--- Beware
1. Social Engineering  2. Facebook Phishing  3. Keylogging  4. Password Stealers 5. Brute Force Attacks 6. Dictionary Attacks 7. Exploiting Facebook's Trusted Friend Feature 8. Fake SMS (To Hack Facebook Status) 9. Session Hijacking 10. Sidejacking 11. Clic...

Your Facebook can be ‪#‎hacked‬ in 18 ways--- Beware
bprince001.blogspot.com
1
Bhavesh Jangale
3 years ago
If your Pen Drive is infected do this.......
If your Pen Drive is infected with any of the following viruses: * Autorun.inf * new folder.exe * Iexplorer.vbs * Bha.vbs * nfo.exe * New_Folder.exe * ravmon.exe * RVHost.exe or any other files with extension. Actually this viruses are hidden and can't be s...

If your Pen Drive is infected do this.......
bprince001.blogspot.com
Bhavesh Jangale
3 years ago
How to Hack Memory card password
Hi friends! if you really want to hack any memory card's password from heart, you can try this trick. To hack the password, follow these steps- 1> open C:\System by using any file explore (where 'C:\' is ur memcard drive letter) 2> rename 'mmcstore' as 'mmc...

How to Hack Memory card password
bprince001.blogspot.com
Bhavesh Jangale
3 years ago
HOW TO KNOW ADMIN PASSWORD THROUGH GUEST ACCOUNT
1) Go to C:/windows/system32. 2) Copy cmd.exe and paste it on desktop. 3) Rename cmd.exe to sethc.exe. 4) Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes. 5) Now Log out from your guest account and at the user s...

HOW TO KNOW ADMIN PASSWORD THROUGH GUEST ACCOUNT
bprince001.blogspot.com
Bhavesh Jangale
3 years ago
Cyber Security Tasks Quick Reference Checklist
This checklist is intended to help the designated person(s) responsible for information security in their  organization to determine minimally how frequently a task should be done. Some tasks are done daily  while others occur weekly, annually or as needed....

Cyber Security Tasks Quick Reference Checklist
bprince001.blogspot.com
Bhavesh Jangale
3 years ago
TOP TEN CYBER SECURITY ACTION ITEMS
1.Designate a Principal Individual Responsible for Cyber Security Designate, in writing, a principal individual who is responsible for cyber security in order to ensure that proper policies and procedures are in place. This may be a part-time or full-time a...

TOP TEN CYBER SECURITY ACTION ITEMS
bprince001.blogspot.com
Bhavesh Jangale
3 years ago
CYBER SECURITY GLOSSARY OF TERMS
Backdoor : an unauthorized method into a computer device.    Back up (verb): to copy an electronic record to ensure its information will not be lost, often while  compressing data to save space.    Backup (noun) : a copy of an electronic record, maintained ...

CYBER SECURITY GLOSSARY OF TERMS
bprince001.blogspot.com
Bhavesh Jangale
3 years ago
NEED AND IMPORTANCE OF Cyber Security
 ¨Industry
Need for Information Security ¨1.
To protect the organization’s ability to function, ¨2.
To enable the safe operation of applications implemented on the organization’s
IT systems, ¨3.
To protect the data the organization collects and uses, and ¨4...

NEED AND IMPORTANCE OF Cyber Security
bprince001.blogspot.com
Bhavesh Jangale
3 years ago
**
Introduction to the cyber risks Cyber risks can be divided into three distinct areas: Cyber crime : Individuals working alone, or in organised groups, intent on extracting money, data or causing disruption. This can take many forms, including the acquisitio...

YOU CAN
bprince001.blogspot.com
Bhavesh Jangale
3 years ago
WHAT IS CYBER SECURITY?
Many aspects of our lives rely on the Internet and  computers, including communications (email, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation),  government (birth/death records, social security, lice...

WHAT IS CYBER SECURITY?
bprince001.blogspot.com
1
More posts