Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
What do you know about Physical Security ?
|
Jan 28, 2022 |
|
Other Wireless Technologies that you wanted to know about.....
|
Jan 20, 2022 |
|
Wire less Attacks that you need to be aware of.
|
Jan 13, 2022 |
|
Wireless Access point where exactly need to be placed in our organization or our home ?
|
Jan 12, 2022 |
|
Wireless encryption Explore the vulnerabilities it had before you use it.
|
Jan 11, 2022 |
|
How to secure Wi-Fi devices ? How to secure ?
|
Jan 01, 2022 |
|
How to secure network media ?
|
Dec 29, 2021 |
|
How to secure network devices ? What are network devices ?
|
Dec 27, 2021 |
|
How can we secure our Networks ?
|
Dec 26, 2021 |
|
What is ARP ? Where it will be ? How ARP Poisoning done ?
|
Dec 25, 2021 |
|
What is DNS ? How DNS(Domain Name Server) attacks can be performed ?
|
Dec 18, 2021 |
|
How Transitive concept is used in Internet Attacks ?
|
Dec 12, 2021 |
|
What is Replay Attack ? How it is performed...
|
Dec 11, 2021 |
|
What is Hijacking ? How it is performed in Internet world & How many types are there ...
|
Dec 09, 2021 |
|
How Spoofing can be done or what is it ?
|
Dec 08, 2021 |
|
How to stop DDoS ?
|
Nov 28, 2021 |
|
What is a Distributed denial of service(DDoS) attack ?
|
Nov 23, 2021 |
|
What is Denial of Service attack ?
|
Nov 22, 2021 |
|
What are Unnecessary ports ? How to close it....
|
Nov 21, 2021 |
|
What exactly ports & protocols does in our laptops...
|
Nov 19, 2021 |
|
A small Intro of Network attacks...
|
Aug 29, 2021 |
|
Defending Servers....
|
Aug 28, 2021 |
|
Issues with Cloud and how to secure them.....
|
Aug 27, 2021 |
|
As a Service that we get over Network from Cloud....
|
Aug 26, 2021 |
|
Cloud Types...
|
Aug 25, 2021 |
|
New Trend In IT Industry - Cloud Computing
|
Aug 24, 2021 |
|
UTM Device Every Solution for your security problem...
|
Aug 04, 2021 |
|
NIDS VS NIPS Which is better device ?
|
Aug 03, 2021 |
|
Data loss prevention (DLP) this is how we inspect the data that is going out of our network...
|
Aug 02, 2021 |
|
What are Honeypots and Honeynets ?
|
Jul 27, 2021 |
|
Proxy Servers types that we use in these internet world...
|
Jul 26, 2021 |
|
Firewalls first step for your perimeter security...
|
Jul 23, 2021 |
|
Perimeter Security A process of securing your devices for outer world
|
Jul 21, 2021 |
|
Telephony Devices that we used to communicate b/w two different computers in way back days...
|
Jul 13, 2021 |
|
Network Address Translation (NAT) this is how private IP address are changed to public IP address....
|
Jul 09, 2021 |
|
Subnetting a way of using IP address more efficiently...
|
Jul 08, 2021 |
|
Virtual Local Area Networks (VLANS)
|
Jul 07, 2021 |
|
Network Access Control (NAC) Rules that we set for a Network....
|
Jul 06, 2021 |
|
Types of Network Zones that we use ...
|
Jun 21, 2021 |
|
Routers which connect two different Internet Protocol address(I.P.)...
|
Jun 11, 2021 |
|
Switches which work at Data link Layer of OSI Model...
|
Jun 09, 2021 |
|
OSI model this is how two devices can talk...
|
Jun 06, 2021 |
|
A Short intro for Network the ins and outs of it....
|
Jun 05, 2021 |
|
What is Structured Query Language(SQL) Injection ?
|
Jun 04, 2021 |
|
Another two most common vulnerabilities that can be found in web applications XSS & XSRF....
|
Jun 03, 2021 |
|
Buffer Overflows the most common Vulnerability that can be found in any application in different forms...
|
Jun 02, 2021 |
|
Common types of vulnerabilities and exploits that we can found in software products...
|
Jun 01, 2021 |
|
Testing Methods of software products..
|
May 31, 2021 |
|
Principles of SDLC that we need to know in-order for secure coding Practices....
|
May 29, 2021 |
|
Commonly used Software Development models in-order to develop software products...
|
May 28, 2021 |
|
Securing Applications with the only features that they provide...
|
May 27, 2021 |
|
Web Browser concerns that we need to know...
|
May 26, 2021 |
|
Things to known about Web browser Security...
|
May 25, 2021 |
|
Intro to the Application Security....
|
May 21, 2021 |
|
How to secure VMs...
|
May 20, 2021 |
|
Hypervisors father of virtual resource creation....
|
May 19, 2021 |
|
Threats that are associated with Virtualization....
|
May 18, 2021 |
|
Virtualization A door for excessive power...
|
May 16, 2021 |
|
File Systems and Hard drives...
|
May 15, 2021 |
|
Group Policy An Administrative control....
|
May 14, 2021 |
|
This is how an organization Uses Patch Management System to update their devices....
|
May 09, 2021 |
|
What is Updates and Patches What is the difference ?
|
May 08, 2021 |
|
On what basis we need to select the Operating system(O.S) that we want to use in our devices.....
|
May 07, 2021 |
|
How Unnecessary Application are eating Up your disk space and making your laptop vulnerable in the Internet world
|
May 05, 2021 |
|
10 Best Ways To secure your mobile devices....
|
May 04, 2021 |
|
BYOD OR CYOD which does your organization use....
|
May 03, 2021 |
|
How You are going to secure your Mobile Devices from App that was not developed by you ?
|
May 01, 2021 |
|
What happens if you lost your mobile device which stores your valuable information.....
|
Apr 30, 2021 |
|
How Attacker's get into your devices over bluetooth.....
|
Apr 29, 2021 |
|
SIM Cloning and ID Theft How it happens....
|
Apr 28, 2021 |
|
How To Secure Mobile devices from mobile malware out there....
|
Apr 27, 2021 |
|
How To Secure Wireless devices that we are using...
|
Apr 23, 2021 |
|
How Encryption helps us to secure our hard disks in which we will store our precious information...
|
Apr 21, 2021 |
|
Securing Storage Devices
|
Apr 20, 2021 |
|
Securing Basic Input Output System(BIOS)
|
Apr 19, 2021 |
|
For Keeping your information under your control use Data Loss Prevention(DLP) tool.
|
Apr 18, 2021 |
|
POP UP's how Dangerous they are .......
|
Apr 15, 2021 |
|
Intrusion Detection System (IDS) a true security software guard for our laptops
|
Apr 14, 2021 |
|
Firewalls which help to secure in the internet world
|
Apr 09, 2021 |
|
Preventing malware in order to stop infecting our electronic machines which has the internet facility
|
Apr 07, 2021 |
|
How to get rid of malware from our electronic device which has the internet facility
|
Apr 06, 2021 |
|
How to identify the symptoms of malware on our electronic system
|
Apr 05, 2021 |
|
What are Backdoor & Logic bombs
|
Apr 04, 2021 |
|
What is Active Interception and Privilege Escalation
|
Apr 03, 2021 |
|
What are Botnets and Zombies
|
Apr 02, 2021 |
|
Common Delivery methods for malware to get into your system
|
Apr 01, 2021 |
|
Intro to Malware Infections
|
Mar 30, 2021 |
|
History of cryptography
|
Dec 25, 2020 |
|
Protect your information in the internet world with the help of cryptography...
|
Dec 24, 2020 |
|
Malwares how they act as a middle man ??
|
Dec 23, 2020 |
|
Hackers what they do !!!
|
Dec 22, 2020 |
|
Welcome to the ethical world!
|
Dec 21, 2020 |