December, 2017

  • 30 December

    What is the Cloud Technologies and Security

    What is the Cloud Technologies and Security

    What is the cloud: While cloud computing is new term, it is not a new concept and is actually a grown-up and more mature version of what used to be known as grid computing. No matter what you call it, the cloud is a way of moving services, infrastructure, and …

  • 29 December

    Mobile Device Security – Countermeasures – Summary – Exam Essentials

    Mobile Device Security – Countermeasures – Summary – Exam Essentials

    Countermeasures: Similarly to securing desktops, servers, networks, and other equipment, you can take some basics steps to make mobile devices more resistant to attack. What’s included here is some basic guidance but not a comprehensive list of all that can be done: Setting passwords on all mobile devices is a …

  • 28 December

    Penetration Testing Mobile Devices Using Android

    Penetration Testing Mobile Devices Using Android

    Penetration Testing Mobile Devices: So how do we pen test mobile devices? In many ways the process is similar to what we are already using in a traditional setting but with some minor difference along the way.   NOTE: Remember that in regard to security, mobiles are so diverse that …

  • 27 December

    [Sim Database 100% Working] How To Check Mobile Number Detail in Pakistan Name,CNIC,Address,City, ETC

    Now You Can Check Any Num Data like Ownership Details ,Cnic Details , Home Addres and Other Contact info , Database 2017

    All Network Sim Number And Cnic Number Database Only Pakistan 2017 | Sim database | Check any number information | All Network sim database: In this video I show you have you can get information about any mobile number in pakistan. Like CNIC,ADDRESS,NAME Or Active numbers Against CNIC. Hello all now …

  • 27 December

    Apple iOS – Security

    Apple iOS – Security

    Apple iOS: The second most popular mobile operating system in the market is Apple’s iOS, which is present on multiple devices including the iPod, iPad, and iPhone. Much as Android is based on the linux Kernel, iOS is a slimmed-down version of OS X for the Mac. However, while it …

  • 26 December

    The Python Programming Language – Download Complete Course Free

    The Python Programming Language - Download Complete Course Free

    The Python Programming Language – Download Complete Course Free Python Overview Scripting Language bject-Oriented Portable Powerful Easy to Learn and Use Mixes good features from Java, Perl and Scheme   Major Uses of Python System Utilities GUIs (Tkinter, gtk, Qt, Windows) Internet Scripting Embedded Scripting Database Programming Artificial Intelligence Image …

  • 26 December

    Design of Android – Security

    Design of Android – Security

    Design of Android: Android, under the hood, is a series of components working together to make the system work. Each component in the system is self-contained and focuses on performing whatever task it was designed to do. Each component focuses on security measures for itself and assumes that every other …

  • 25 December

    Google Android OS – Security

    Google Android OS – Security

    Google Android OS: First, let’s look at the market leader, Android, in our exploration of mobile operating systems. Android took shape way back in 2003 at the hands of Android Inc., which was acquired by Google in 2005. From the beginning, the OS was designed to be mobile platform that …

  • 24 December

    Mobile Security Models and Architectures

    Mobile Security Models and Architectures

    Mobile OS Models and Architecture: The rapid adoption of the mobile device in the workplace has had two obvious consequences: an increase in productivity and capability as well as a corresponding rise in the number of security risks. The designers of devices have frequently made a tradeoff between security and …

  • 23 December

    DoS | Botnet Specific Defensive Strategies

    DoS | Botnet Specific Defensive Strategies

    DoS | Botnet Specific Defensive Strategies: Let’s look at some DoS defensive strategies:- Disabling Unnecessary Services: You can help protect against DoS and DDoS attacks by hardening individuals systems and by implementing network measures that protect against such attacks. Using Anti-Malware:  Real-time virus protection can help prevent bot installations by …