Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner

AttackDefense: Meterpreter Basics Walk-through

Purple AD – Active Directory Lab Environment

Career in Cyber Security

Cyber Security Education & Career

Windows 10: Tame the Beast

Uday Mittal August 7, 2015 Leave a Comment

Windows 10: Tame the Beast

  With more than 14 million downloads, in less than 24 hours since it’s launch, Microsoft Windows 10 is being considered the best-ever Windows product. Why shouldn’t it be, it’s free after all (for those who hold genuine Windows 7 or 8 license). An year of free Windows is a commendable initiative by Microsoft to ensure […]

Filed Under: Under the Hood Tagged With: Cortana, Microsoft, privacy, Windows 10

Are you the Person of Interest?

Uday Mittal August 6, 2015 Leave a Comment

Are you the Person of Interest?

Imagine the Big Brother from George Orwell’s 1984, only in stealth mode. A system so sophisticated that nothing hides from it. It’s eyes and ears are everywhere. It knows where you are, why you’re there, who you are meeting with and what you are talking about. It watches you every minute of every day. Yet […]

Filed Under: Recommended TV Shows Tagged With: Harold Finch, Person of Interest, Root, the Machine

DCPP: Everything You Need to Know

Uday Mittal July 16, 2015 9 Comments

DCPP: Everything You Need to Know

Last week I gave the DSCI Certified Privacy Professional (DCPP) exam and got my result few days back. Somehow I cleared the exam. Phew! Data Security Council of India (DSCI), is a NASSCOM initiative “To develop capabilities, capacities and norms, in collaboration with all the stakeholders including the government, required to advance towards a safer, […]

Filed Under: Upcoming Certifications Tagged With: Certification, DCPP, DSCI, NASSCOM, privacy

Information Classification: Incentivise, Hammer & Automate

Uday Mittal July 2, 2015 Leave a Comment

Information Classification: Incentivise, Hammer & Automate

“One can only protect something, if they know what is it they need to protect, where is it, who is accessing it and how, how is it being used and to what level should they protect it”.  The above principle holds true, more than anything, for Information Security professionals. Primarily, because to secure any information […]

Filed Under: Under the Hood Tagged With: hammer & automate, incentivise, Information Classification

Will Bitcoin Rule The Free World?

Uday Mittal June 29, 2015 Leave a Comment

Will Bitcoin Rule The Free World?

Every once in a while, a new idea is born—one that has the potential to question the very foundations of everything we know about the world as it is today. The ideas I am talking about are those that have changed and will change the world for the better. Take email, for example—at its inception, […]

Filed Under: Under the Hood Tagged With: Bitcoin, bitcoin mining, crypto-currency, Satoshi Nakamoto

CISSP: Everything You Need to Know

Uday Mittal June 28, 2015 1 Comment

CISSP: Everything You Need to Know

I had been waiting for this moment since past few months and it happened yesterday, I passed the CISSP Certification exam in first attempt. Yay! Before I write further, I would like to thank my ex-colleagues and friends who guided me and patiently answered my endless barrage of questions regarding the certification process. Given the value […]

Filed Under: Essential Certifications Tagged With: (ISC)2, Certification, CISSP, Eric Conard, Information Security, Shon Harris

Good Read: The Snowden Files

Uday Mittal June 26, 2015 Leave a Comment

Good Read: The Snowden Files

When I first heard about the PRISM mass surveillance program, conducted by the United States National Security Agency (NSA), I thought it was an hoax. Primarily, because up until then that kind of stuff belonged to Hollywood movies only, at least for the uninformed me. But as the news snowballed and caught the attention of […]

Filed Under: Good Reads, Non-Fiction Tagged With: Edward Snowden, Luke Harding, Mass Surveillance, The Snowden Files

A Movie on Privacy: Enemy of the State (1998)

Uday Mittal June 25, 2015 Leave a Comment

A Movie on Privacy: Enemy of the State (1998)

Recently, I read an article about how government surveillance has evolved over the years and how the adoption of new technologies and services is aiding it. An interesting point to note was the striking similarity between the government’s version and the ‘tracking‘ done by the private firms for ‘analytical purposes‘ to ‘improve their services‘. While […]

Filed Under: Recommended Motion Pictures Tagged With: Enemy of the state, privacy

Social Media: Better Be Safe Than Sorry

Uday Mittal June 24, 2015 Leave a Comment

Social Media: Better Be Safe Than Sorry

I still remember the time when I first learnt about the concept of Social Media. It was through Orkut (R.I.P.), the not so successful attempt of Google Inc. to enter into this market. Even though in the larger scheme of things it didn’t fare well but at the time it was the rage. With time […]

Filed Under: Awareness Tagged With: Self-worth, Social Media

Uday Mittal June 23, 2015 1 Comment

Secure Your Wifi Connection: Why & How?

If you’ve been on the internet for a while you would have come across one of those Memes highlighting the importance Wifi in our lives. If not do a quick Google search, get a cup of coffee and have a blast! Thanks to our 24 x 7 companions, smartphones, tablets and laptops, Wifi has almost […]

Filed Under: Awareness

  • « Previous Page
  • 1
  • …
  • 6
  • 7
  • 8

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Media user enumeration Wifi

Top Posts

  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress