Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner
CSX Fundamentals: Everything You Need to Know

CSX Fundamentals: Everything You Need to Know

Cybersecurity Canon Project

The Cybersecurity Canon Project

Career in Cyber Security

Cyber Security Education & Career

A Movie on Privacy: Enemy of the State (1998)

Uday Mittal June 25, 2015 Leave a Comment

A Movie on Privacy: Enemy of the State (1998)

Recently, I read an article about how government surveillance has evolved over the years and how the adoption of new technologies and services is aiding it. An interesting point to note was the striking similarity between the government’s version and the ‘tracking‘ done by the private firms for ‘analytical purposes‘ to ‘improve their services‘. While […]

Filed Under: Recommended Motion Pictures Tagged With: Enemy of the state, privacy

Social Media: Better Be Safe Than Sorry

Uday Mittal June 24, 2015 Leave a Comment

Social Media: Better Be Safe Than Sorry

I still remember the time when I first learnt about the concept of Social Media. It was through Orkut (R.I.P.), the not so successful attempt of Google Inc. to enter into this market. Even though in the larger scheme of things it didn’t fare well but at the time it was the rage. With time […]

Filed Under: Awareness Tagged With: Self-worth, Social Media

Uday Mittal June 23, 2015 1 Comment

Secure Your Wifi Connection: Why & How?

If you’ve been on the internet for a while you would have come across one of those Memes highlighting the importance Wifi in our lives. If not do a quick Google search, get a cup of coffee and have a blast! Thanks to our 24 x 7 companions, smartphones, tablets and laptops, Wifi has almost […]

Filed Under: Awareness

  • « Previous Page
  • 1
  • …
  • 6
  • 7
  • 8

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

Active directory Active directory lab adsecurity adsi adsisearcher Android attack active directory awareness blue whale challenge Certification CISSP command and control crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden ellitedevs forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team Risk Management Social Media user enumeration Wifi Windows

Top Posts

  • Web App Pentesting using BodgeIt Store (Part 1)
    Web App Pentesting using BodgeIt Store (Part 1)
  • Are you sharing sensitive information over WhatsApp?
    Are you sharing sensitive information over WhatsApp?
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress