Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas

Translate Articles

One of our mission is to ensure the safety and security of people interacting with the Cyber World. We can only achieve this when our message reaches the majority of people using any sort of computer enabled system in their daily lives.

At present, there are 941,525,760 English speaking people using the Internet, this represents 26.4 % of all the Internet users in the world. We want to increase our reach to non-English speaking population (i.e. 73.6% ) as well and we need your help for that.

We invite you to translate any of the published articles, on Yaksas CSC website, in a language native to you. An article could be translated in more than one language, in fact the more the better. All you have to do is submit the converted article text in the form below or send it to us at csc[at]yaksas[dot]in. A humble request, if you’re using any online translator websites please make sure that the translated article is accurate in terms of grammer and semantics.

    *Name:

    *Email:

    *Translation Language:

    *Article Title:

    *Translated Text:

    Solve the reCaptcha:

    Optin Form

    Search

    Follow us on Twitter

    My Tweets

    Categories

    Tags

    (ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

    Top Posts

    • Mona.py for exploit devs: 6 must know commands
      Mona.py for exploit devs: 6 must know commands
    • What is Adversary Emulation?
      What is Adversary Emulation?
    • Build Your Career in Cyber Security
      Build Your Career in Cyber Security
    • CISA: Everything You Need to Know
      CISA: Everything You Need to Know
    • Let there be no more MMS Scandals
      Let there be no more MMS Scandals
    • 7 Ways to Cover Your Device's Camera
      7 Ways to Cover Your Device's Camera

    © Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress