TCP/IP Network Model

From the earlier discussions, we are aware that the communications in the network is based on different network models. And also we have learnt about OSI Model. If not exactly remembering, here is the reference. TCP/IP Network Model is yet an another important one beside OSI Model. OSI being the seven layered model, TCP/IP Model […]

Social engineering

“As we have noticed several followers are enthusiastic to gain more knowledge, we have an exciting world of knowledge created for you. You will have an access to numerous books, courses that we have cascaded together. To enter a new world, click here and take a ride!” Here we go now. Social engineering is a […]

Picked up Platforms.

The information we are imparting will gradually plunge into depth. We hope for a better foundation by cascading data from several references but if you are a little hasty to know more, we guide you in that way as well. Here are some suggestions from venerable learning platforms. Station X Station X has been a […]

Hacking Organizations

Remember the question from Introduction, Who did it? Here comes the answer. These are some notable hacking organizations. Isn’t that strange? Actually Not!!. This doesn’t mean that they are only involved in hazardous activities. Some are with us and some for us, mean the same, but the perspective do not!! Some work as government agencies,corporations […]

Women in Security

If we think subject is only required to be professional, we are wrong!! So, let’s include some great achievements. Most of the world think of women’s safety!! As a return gift, women are also into the world’s security. To support them, we shall study some of the organizations or associations that relate to Women in […]

CYBER SECURITY AND ETHICAL HACKING

Have you ever felt insecure when someone interrupted your conversation with your best friend (especially secret convos)? Yes? Okay, let’s get to the point. Ever thought of a day where all our personal data exposed? In these days everything almost became possible. We put everything into internet’s hand and we assume that it’s secure. But […]