Skip to content
  • Home
  • Cybersecurity In A Nutshell
  • Power Squad Selection
  • Shakti Squad Selection
Menu
Indian Cyber Troops Indian Cyber Troops

Let's Have Something Unique

  • Home
  • Cyber Security
    • Cyber Safety
  • Technology
    • Development
    • Interested Articles
    • These Android Apps Caught Stealing Users Facebook Passwords
    • Who are Indian Cyber Troops
    • Cyclone Tracker
  • Hinduism
  • Contact Us
  • News
    • Internal Investigation
    • Current Affairs
    • Health And Lifestyles
    • VPN Ban in India: Parliamentary Committee wants to ban VPN services in the Country
    • Who are Indian Cyber Troops
  • Squad Slection
    • Power Squad Selection
    • Shakti Squad Selection
    • Volunteer Squad Selection
  • About Us
  • Cyber Consultancy And Help Portal
  • Volunteer Squad Selection
  • Verification
  • Responsible Disclosure Policy
Wednesday, Jun 29, 2022

Category: Cyber

  • Home
  • Cyber
  • Page 8

Cookies. What are they?

Indian Cyber TroopsMay 3, 2021October 1, 2021
Cyber Security

Cookies An HTTP cookie (also called web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data stored on the user‘s computer by the web browser while browsing a website. Cookies were designed to be a reliable mechanism for websites to remember stateful information (such as items added in the shopping […]

Continue Reading

Cyber security Best Practices

Indian Cyber TroopsMay 3, 2021October 1, 2021
Cyber Security

Cyber security Best Practices First, a note to IT admins about this open letter. The admin’s job is never done. Ever. Period. End of story. You work all day, you go home, you think about work, you dream about work, […]

Continue Reading

INDIA’S NATIONAL CYBER SECURITY POLICY (NCSP) AND ORGANISATION

Indian Cyber TroopsMay 3, 2021October 1, 2021
Cyber Security / law & order

Introduction The nature of war does not alter but its character does. Several seminal events and technological innovations were responsible for these alterations War has expanded from the land and sea domain to air and space with the advent of […]

Continue Reading

Vulnerability Analysis With OpenVAS

Indian Cyber TroopsMay 3, 2021October 1, 2021
Cyber Security

Introduction  If you take a broad view of penetration testing, the first step is information gathering, and after that, every step is closely related to the next one. In fact, all the steps fall into one broad category: exploitation. Vulnerability […]

Continue Reading

Ethical Issues in the IT industry

Indian Cyber TroopsMay 3, 2021October 1, 2021
Cyber Security

Ethical Issues in IT Industry Ethics is defined as, “the discipline dealing with what is good and bad and with moral duty and obligation.”. In the IT industry where there are no comprehensive standards in place, with the emergence of […]

Continue Reading

OSI MODEL (Open Systems Interconnection Model)

Indian Cyber TroopsMay 3, 2021October 1, 2021
Cyber Security

The OSI reference model was developed by the International Organization for Standardization (ISO), and it has seven layers in all. The layers are as follows • Application (layer 7) • Presentation (layer 6) • Session (layer 5) • Transport (layer […]

Continue Reading

CYB3R CRIMES : “THE DARK TRUTH OF INTERNET”

Indian Cyber TroopsMay 3, 2021October 1, 2021
Cyber Security

CYB3R CRIMES : “THE DARK TRUTH OF INTERNET” In the current era of online processing, maximum of the information is online and prone to cyber threats. There are a huge number of cyber threats and their behavior is difficult to […]

Continue Reading

Information Technology Act, 2000

Indian Cyber TroopsMay 2, 2021October 1, 2021
Cyber Security / law & order

INDIAN IT ACT, 2000 The IT Act 2000 is also known as an IT Act and was proposed by the Indian Parliament on 17 October 2000 by the Indian Parliament. The Act provides a legal framework for electronic governance by giving recognition […]

Continue Reading

Mind Blowing History of Cyb3r-Security

Indian Cyber TroopsMay 2, 2021October 1, 2021
Cyber Security

♥History Of Cyb3r-Security♥ Many organisms evolve at the same time, each attempting to gain an advantage over the other. Criminals and “bad actors” who aim to manipulate device flaws for personal benefit – or just to make a point – […]

Continue Reading

Posts navigation

Previous 1 … 7 8

For You

  • Cyber (79)
    • Cyber Safety (12)
    • Cyber Security (73)
  • Hinduism/Bhakti (6)
  • Interested Articles (8)
  • Kali Linux (11)
  • law & order (15)
  • News (64)
    • Current Affairs (18)
    • Health And Lifestyles (10)
    • politics (4)
  • Programming (3)
  • Technology (11)
    • Development (4)

Something For You

  • How to Become a Bug Bounty Hunter From Scratch
  • How to Make Money on Fansly
  • Pros and Cons of Using Multiple Clouds
  • Kali Linux Commands Cheat Sheet
  • How To Install A VPN In Kali Linux

Latest

  • How to Become a Bug Bounty Hunter From Scratch
  • How to Make Money on Fansly
  • Pros and Cons of Using Multiple Clouds
  • Kali Linux Commands Cheat Sheet
  • How To Install A VPN In Kali Linux
Search
Menu
  • Home
  • Cyber Security
    • Cyber Safety
  • Technology
    • Development
    • Interested Articles
    • These Android Apps Caught Stealing Users Facebook Passwords
    • Who are Indian Cyber Troops
    • Cyclone Tracker
  • Hinduism
  • Contact Us
  • News
    • Internal Investigation
    • Current Affairs
    • Health And Lifestyles
    • VPN Ban in India: Parliamentary Committee wants to ban VPN services in the Country
    • Who are Indian Cyber Troops
  • Squad Slection
    • Power Squad Selection
    • Shakti Squad Selection
    • Volunteer Squad Selection
  • About Us
  • Cyber Consultancy And Help Portal
  • Volunteer Squad Selection
  • Verification
  • Responsible Disclosure Policy
Copyright © Indian Cyber Troops 2022 Developed By: Prism Infoways
×