CALL US

+91 9116117170

Author: Chandan Singh

ADB

What is ADB? ADB Latest Commands List

By Chandan Singh 0 Comment August 30, 2019

In this article, you will learn what is ADB? ADB Latest Command Lists, ADB (Android Debug Bridge) is, why users need it, and how to manage it using commands in the Android terminal. Well, let’s begin to study adb android commands. ADB (android debug bridge) is a debugging tool, detecting errors in applications, unlocking devices on Android […]

Netcat

What is Netcat? All NetCat Commands

By Chandan Singh 0 Comment April 18, 2019

Netcat utility is often called “Swiss Army Knife”, in the good sense of the word. The netcat functionality is useful to the same extent that the versatility and handiness of the reputable pocket Swiss Army Knife is useful. Some of its features include port scanning, file transfer, port listening, and it can be used as […]

Social Engineering

Social Engineering: how not to fall for the scam?

By Chandan Singh 0 Comment April 4, 2019

In nature, there are two of the most powerful motivators for all human actions – this is fear and curiosity. Each of them can lead to illogical and stupid acts that do not always turn out to be something good. Ekaterina Rudaya, an expert at the Jet Infosystems security analysis lab , tells how human emotions play on the […]

Facebook + Email

Facebook began to request a password from the e-mail from new users

By Chandan Singh 0 Comment April 4, 2019

“Hey, Facebook, asking for a password from personal mail for verification or any other purposes is a HORRIBLE idea from the point of view of information security. You so entice passwords that you should not know! “ Facebook asked e-sushi for a password from the email to confirm the address.Despite the fact that the social network […]

what is vapt

What is VAPT and Why would your Organization need VAPT Audit?

By Chandan Singh 0 Comment March 4, 2019

Purpose The purpose of the document is to highlight the basic concepts of vulnerability assessment, the reader should have some basic technical knowledge in the field of information technology in order to understand the content of the article, however, this document does not go deep into deep technical knowledge. What is VAPT? Vulnerability Assessment and […]

error: Content is protected by Cyberops !!