Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner

Translate Articles

One of our mission is to ensure the safety and security of people interacting with the Cyber World. We can only achieve this when our message reaches the majority of people using any sort of computer enabled system in their daily lives.

At present, there are 941,525,760 English speaking people using the Internet, this represents 26.4 % of all the Internet users in the world. We want to increase our reach to non-English speaking population (i.e. 73.6% ) as well and we need your help for that.

We invite you to translate any of the published articles, on Yaksas CSC website, in a language native to you. An article could be translated in more than one language, in fact the more the better. All you have to do is submit the converted article text in the form below or send it to us at csc[at]yaksas[dot]in. A humble request, if you’re using any online translator websites please make sure that the translated article is accurate in terms of grammer and semantics.

    *Name:

    *Email:

    *Translation Language:

    *Article Title:

    *Translated Text:

    Solve the reCaptcha:

    Optin Form

    Search

    Follow us on Twitter

    My Tweets

    Categories

    Tags

    Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Media user enumeration Wifi

    Top Posts

    • 7 Ways to Cover Your Device's Camera
      7 Ways to Cover Your Device's Camera
    • Mona.py for exploit devs: 6 must know commands
      Mona.py for exploit devs: 6 must know commands
    • Social-Engineer Toolkit: An Introduction
      Social-Engineer Toolkit: An Introduction
    • CISA: Everything You Need to Know
      CISA: Everything You Need to Know
    • Active Directory User Enumeration using PowerView
      Active Directory User Enumeration using PowerView
    • Red Team Operations Attack Lifecycle
      Red Team Operations Attack Lifecycle

    © Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress