Tag: #KiranHacker
File Transfer Protocol (FTP)
Kiran Parmar Jan 3, 2025 0 282
FTP (File Transfer Protocol) is an essential internet protocol provided by TCP/IP, designed to transfer files between systems over...
Securing SSH (Port 22) with Multi-Factor Authentic...
Kiran Parmar Dec 22, 2024 1 302
This article explains how to secure SSH (Port 22) with Multi-Factor Authentication (MFA), enhancing the security of remote access ...
Popular Posts
-
Amroha Police Cyber Security Internship Program - 2025
DEEPAK YADAV May 20, 2025 1 2540
-
Cyber Security Summer Internship Gurugram Police 2025 1...
DEEPAK YADAV May 1, 2025 0 878
-
Helpline for Cybercrime: How Can I Report Cybercrime in...
DEEPAK YADAV Nov 5, 2024 0 869
-
The Defense Ministry Issues a Fake Channel Alert Here's...
DEEPAK YADAV Nov 4, 2024 0 559
-
Help Line 1930
DEEPAK YADAV Aug 7, 2024 0 547
Our Picks
-
"Unlocking Crime Mysteries: The Seven Principles of For...
Rupali Shukla Jul 2, 2025 0 26
-
what is the Infostealers.
Ranjeet Yadav Jun 15, 2025 0 25
-
The CBI busts a cybercrime ring and confiscates ₹22 lak...
Lalit Jun 12, 2025 0 57
-
आज का साइबर सुरक्षा विचार...
Ranjeet Yadav Jun 3, 2025 0 72
-
Social Engineering: The Art of Human Hacking
Shashank dave Jun 1, 2025 0 74
Categories
- Cyber Crime(32)
- Help Line(8)
- Seminars(2)
- Case Study(1)
- Trending Crime(9)
- News(144)
- Cyber News(115)
- Technology News(8)
- Latest Updates(20)
- Join Us(0)
- Cyber Intern(0)
- Cyber Photography Team(0)
- Podcast(8)
- Blog(28)
Random Posts
Tags
- सायबर क्राईम के जगत मे पहली बार दो ठगीओंको सात-सात साल कि सश्रम कारावास
- digitalwarrior
- ISCCCC
- Marriage 'apk' App Scam
- maharshtra honeytrap case
- e chalan traffic rules scam
- marriage bureau
- Deepfacke Video
- Narcotics Control Bureau cyber crime
- Bharat AXA Insurance Company
- mumbaipolice
- KERALA POLICE CYBER CELL
- efir
- hacking
- apk app
Voting Poll
Which of these is a sign of a secure website?
Total Vote: 2
The page loads fast
What is 2FA (Two-Factor Authentication)?
Total Vote: 1
Logging in with two devices
What is the most important first step when collecting digital evidence from a suspect’s device?
Total Vote: 2
Turn off the device to preserve battery life
What is phishing?
Total Vote: 3
A method to catch fish online