Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Welcome to keycybr"They want what you have got, don't give it to them""Think before post"Well in this podcast you will get familiar with Cyber Investigation domain. Cyber crime is on the rise henc... more
FAQs about CI&R WARRIORS:How many episodes does CI&R WARRIORS have?The podcast currently has 173 episodes available.
January 02, 2021USE OF ENCRYPTION BY TERRORISTSUSE OF ENCRYPTION BY TERRORISTSThe purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. These algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and non-repudiation.Featuring "keycybr" CI&R Intern "Abhishek Kumar Sah".Get in touch with him - https://www.linkedin.com/in/abhishek-kumar-sah-328618105/...more22minPlay
January 02, 2021ONLINE EMAIL HEADER ANALYSIS TOOLSONLINE EMAIL HEADER ANALYSIS TOOLSThis tool will make email headers human readable by parsing them according to RFC 822. Email headers are present on every email you receive via the Internet.Featuring "keycybr" CI&R Intern "Ajay M".Get in touch with him - https://www.linkedin.com/in/ajay-murali-899b2817b/...more7minPlay
January 02, 2021SALE OF ILLEGAL ARTICLESSALE OF ILLEGAL ARTICLESAlthough this can be termed as a victimless crime in terms of financial loss etc, the articles being sold are termed illegal for a reason. Narcotics or drugs cause physical and mental damage beyond recovery.Featuring "keycybr" CI&R Intern "Hrishikesh Punju Nikam".Get in touch with him - https://www.linkedin.com/in/rishi-nikam-0b3033159...more12minPlay
January 02, 2021DENIAL OF SERVICE ATTACKSDENIAL OF SERVICE ATTACKSA Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.Featuring "keycybr" CI&R Intern "Anurag Kumar Rawat".Get in touch with him - https://www.linkedin.com/in/pavan-adavi-b43481189/...more12minPlay
January 02, 2021FORGERYFORGERYForgery is a white-collar crime that generally refers to the false making or material alteration of a legal instrument with the specific intent to defraud anyone.Featuring "keycybr" CI&R Intern "Anurag Kumar Rawat".Get in touch with him - https://www.linkedin.com/in/anurag-kumar-8413a0197/...more3minPlay
January 02, 2021SECTION 66D. PUNISHMENT FOR CHEATING BY PERSONATION BY USING COMPUTER RESOURCESECTION 66D. PUNISHMENT FOR CHEATING BY PERSONATION BY USING COMPUTER RESOURCEWhoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.Featuring "keycybr" CI&R Intern "Jayesh Auti".Get in touch with him - https://www.linkedin.com/in/jayesh-auti-365422192/...more4minPlay
January 02, 2021INTERNET TIME THEFTINTERNET TIME THEFTIt refers to the theft in a manner where the unauthorized person uses internet hours paid by another person. The authorized person gets access to another person's ISP user ID and password, either by hacking or by illegal means without that person's knowledge.Featuring "keycybr" CI&R Intern "Sabbithi Yahwanth".Get in touch with him - https://www.linkedin.com/in/s-yahwanth-780362191/...more11minPlay
January 02, 2021PASSWORD BREAKINGPASSWORD BREAKINGIn cryptanalysis and computer security, password breaking is the process of recovering passwords from data that has been stored in or transmitted by a computer system in scrambled form.Featuring "keycybr" CI&R Intern "Hymavathi M".Get in touch with her - https://www.linkedin.com/in/hymavathi-m-202417177/...more4minPlay
January 02, 2021RECOVERING DELETED EVIDENCERECOVERING DELETED EVIDENCEIf the deleted files have no trace in the recycle bin like in case of the “Ctrl+Delete” command, then, in that case, you can use commercial recovery tools to recover the deleted evidence. One such example commercial tool is DiskInternals Partition Recovery.Featuring "keycybr" CI&R Intern "Teja Kumar".Get in touch with him - https://www.linkedin.com/in/teja-kumar-788b4718b/...more12minPlay
January 01, 2021ANALYSIS OF GMAIL HEADERANALYSIS OF GMAIL HEADEREmail headers contain tracking information for an individual email, detailing the path a message took as it went through various mail servers. The headers contain time-stamps, IP addresses and sender/recipient information.Featuring "keycybr" CI&R Intern "Prasanth Kumar Nagothi".Get in touch with him - https://www.linkedin.com/in/prasanthkumarnagothi/...more15minPlay
FAQs about CI&R WARRIORS:How many episodes does CI&R WARRIORS have?The podcast currently has 173 episodes available.