CALL US

+91 9116117170

Blog

After ‘Serious Breach’ Site Down of EurekAlert

By Chandan Singh 0 Comment September 15, 2016

EurekAlert Site Down after ‘Serious Breach’ sees cyber hackers leak embargoed studies on Twitter. The widely used science news journal website EurekAlert, is down after having a major breach saw hackers leak embargoed news releases and studies on Twitter. EurekAlert said they were notified of a “potential breach” on 11 September, which started an investigation. It […]

How to make bootable pendrive in 3 Steps

By Chandan Singh 0 Comment September 14, 2016

Although there are many ways to make bootable pen drive, but today I wanna share you a simple way to make bootable pen drive for all Operating Systems. Requirements:  USB Drive at least 4 GB or above Universal USB Installer Windows Operating System Operating System ISO File Step 1: Open Universal USB Installer, click on I […]

How to install Nmap on Linux & Windows

By Chandan Singh 0 Comment September 10, 2016

What is Nmap Nmap is stands for Network Mapper, which is open source, used for find network and auditing for security. Network administrator are used for monitoring host or service up time, network inventory, managing service and upgrade networking schedules. Nmap also use raw IP packets are many ways to identify which hosts are available […]

How to Protect Yourself from DDoS Attack

By Chandan Singh 1 Comment September 8, 2016

  What is DDoS Attack DDoS is stands for Distributed Denial of Service (DDoS), used for make online service unavailable by send unlimited number of request to target area. Behavior of server is, it give response to all requests therefor DDoS attack server not able to response all requests, and the result will, that online […]

Students taking Cyber Space for granted

By Karnveer Singh 0 Comment September 7, 2016

Advancement in technology has made a revolutionary change the way internet is used like online shopping, Net Banking, social medial platforms like Facebook, Whats app, Instagram, Twitter,You Tube ,E-mail and also invited threats along like hacking, cyber bullying, cyber stalking, defamation, identity theft etc. However, there is a lack of understanding of privacy and security […]

error: Content is protected by Cyberops !!