All the posts in the form of blogs are being listed here for easier accessing in one go. Please note that some of the posts may be having copyright data, and hence are password-protected to ensure that such post is available to only authorized users. You can request for the password by dropping an email to the author.
Knowledge has to be improved, challenged, and increased constantly, or it vanishes.
Peter Drucker
- Implement cyber security measures to protect against potential threats
- Whole Food Plant Based Diet (Inspired from The China Study)
- Browser Forensic Tool (BFT) – A Benign Tool or Malign Tool??
- Incident Response Case Study: Bitly Account Compromise
- Some important commands in Ubuntu
- साइबर लॉ के क्षेत्र में है करियर के साथ असीम संभावनायें
- Could the computer in your car be hacked?
- Researchers released new attack code for exploiting SCADA vulnerabilities