Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Welcome to keycybr"They want what you have got, don't give it to them""Think before post"Well in this podcast you will get familiar with Cyber Investigation domain. Cyber crime is on the rise henc... more
FAQs about CI&R WARRIORS:How many episodes does CI&R WARRIORS have?The podcast currently has 173 episodes available.
December 31, 2020CYBER DEFAMATIONCYBER DEFAMATIONThe tort of cyber defamation is an act of intentionally insulting, defaming or offending another individual or a party through a virtual medium. It can be both written and oral. Today Internet has given us an opportunity to share our opinions globally.Featuring "keycybr" CI&R Intern "Devarsh Parmar".Get in touch with him - https://www.linkedin.com/in/devarsh-parmar-992b5b169/...more5minPlay
December 31, 2020FINANCIAL CRIMESFINANCIAL CRIMESFinancial crime is crime committed against property, involving the unlawful conversion of the ownership of property to one's own personal use and benefit.Featuring "keycybr" CI&R Intern "Vanshika Gupta".Get in touch with her - https://www.linkedin.com/in/vanshika2900/...more10minPlay
December 30, 2020TRACKING MAIL ACCOUNTSTRACKING MAIL ACCOUNTSEmail tracking is the process of tracking sent emails and using that data to inform business decisions. Most email tracking tools capture data on open rates, times, and locations, as well as click-throughs on links and attachments.Featuring "keycybr" CI&R Intern "Kundurthi Siddhu Sai Krishna".Get in touch with him - https://www.linkedin.com/in/siddhukundurthi...more8minPlay
December 30, 2020GUIDELINES FOR EVIDENCE ARCHIVALGUIDELINES FOR EVIDENCE ARCHIVALArchival evidence refers to the original source materials, which historians regard as primary sources. Everything that they and predecessors write about the past is described as a secondary source.Featuring "keycybr" CI&R Intern "Kilaru Nikhil Chowdary".Get in touch with him - https://www.linkedin.com/in/nikhil-chowdary-kilaru-5762661aa/...more10minPlay
December 30, 2020USING GOOGLE AS A HACKING TOOLSUSING GOOGLE AS A HACKING TOOLSGoogle Dorking is a search technique that enables hackers to gain access to information that corporations and individuals did not intend to make publicly available. Using this technique, hackers are able to identify vulnerable systems and can recover usernames, passwords, email addresses, and even credit card details.Featuring "keycybr" CI&R Intern "Shailendra Verma".Get in touch with him - https://www.linkedin.com/in/shailendra-verma-15a6081b0/...more6minPlay
December 30, 2020TYPES OF TROJANSTYPES OF TROJANSA Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.Featuring "keycybr" CI&R Intern "Sopan Abdal".Get in touch with him - https://www.linkedin.com/in/sopan911/...more6minPlay
December 30, 2020PORT SCANNINGPORT SCANNINGPort scanning is a method of determining which ports on a network are open and could be receiving or sending data. It is also a process for sending packets to specific ports on a host and analyzing responses to identify vulnerabilities.Featuring "keycybr" CI&R Intern "Hemanth Reddy".Get in touch with him - https://www.linkedin.com/in/hemanth-reddy-51b357191/...more8minPlay
December 30, 2020PACKET SNIFFINGPACKET SNIFFINGPacket sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet, or a defined subset of packets, may be gathered for further analysis.Featuring "keycybr" CI&R Intern "Chetan Bansal".Get in touch with him - https://www.linkedin.com/in/chetanbansal11/...more6minPlay
December 29, 2020WEBCRAWLINGWEBCRAWLINGA Web crawler, sometimes called a spider or spiderbot and often shortened to crawler, is an Internet bot that systematically browses the World Wide Web, typically for the purpose of Web indexing (web spidering).Featuring "keycybr" CI&R Intern "Afrar Ahamed".Get in touch with him - https://www.linkedin.com/in/afrar-afri-2ba21b192...more8minPlay
December 29, 2020WRAPPER TOOLSWRAPPER TOOLSWrapper tools combine two or more separate programs at a fundamental level into one package. Some wrappers allow for combining two, six, nine, or even an arbitrary number of programs together. Featuring "keycybr" CI&R Intern "Kasani ShivaTeja".He's is Professional Ethical Hacker, Core team member at TCA company and cybersecurity Manager at Cyberhakz company. And also Security researcher.Get in touch with him - https://www.linkedin.com/in/hacktivist ...more5minPlay
FAQs about CI&R WARRIORS:How many episodes does CI&R WARRIORS have?The podcast currently has 173 episodes available.