Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Welcome to keycybr"They want what you have got, don't give it to them""Think before post"Well in this podcast you will get familiar with Cyber Investigation domain. Cyber crime is on the rise henc... more
FAQs about CI&R WARRIORS:How many episodes does CI&R WARRIORS have?The podcast currently has 173 episodes available.
December 27, 2020HANDLING HIDDEN DATAHANDLING HIDDEN DATATechnology savvy criminals use various methods to hide incriminating information. Hidden files and folders System files Alternate data streams (ADS)Featuring "keycybr" CI&R Intern "Paladugu Jashwanth". He is currently pursuing his bachelor's of technology in the stream of computer science (2nd year).Get in touch with him - https://www.linkedin.com/in/paladugu-jashwanth-a28a23150/...more9minPlay
December 26, 2020HANDLING STEGANOGRAPHYHANDLING STEGANOGRAPHYSteganography is the practice of concealing a message within another message or a physical object. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video.Featuring "keycybr" CI&R Intern "Dhaval Sabapara" He is student of computer engineering, influencer of cybersecurity. Also he is a volunteer at anti cyber crime society He is good at- information security, penetrating tester, system admin.Get in touch with him - https://in.linkedin.com/in/dhaval-sabapara-5021b117a...more7minPlay
FAQs about CI&R WARRIORS:How many episodes does CI&R WARRIORS have?The podcast currently has 173 episodes available.