• Amol Wagh

    China’s Cyber Attacks on Indian Networks : HE News

    by  • March 4, 2017 • Amol Wagh, Ethical hacking, Exclusive, General • 0 Comments

              China’s cyber army is making some suspicious attacks on Indian networks and they worrying India definitely. They are making attacks on private networks. What are there aims? , What are their reasons nobody knows. Chinas government is refusing to answer any questions related to this but sill this is issue can be much more […]

    Read more →

    10 reasons why PCs crash U must Know

    by  • January 2, 2017 • Amol Wagh, Ethical hacking, General, Tips and Tricks, Windows • 4 Comments

    Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.” You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will […]

    Read more →

    Live CD and Live OS

    by  • March 23, 2016 • Amol Wagh, General, Tutorials, Windows • 0 Comments

       If you are a sort of hardcore computer user and you format your system  usually then you should know about this thing known as Live CD.       As you all know that installing new operating system properly needs a format of your drives. This takes lot of time and tedious job also you […]

    Read more →

    Packet Sniffing Attack & Vulnerable Ethernet Communications – I

    by  • March 30, 2009 • Amol Wagh, Firewalls Breaking, IP, Packet Sniffing, Student Series • 0 Comments

    A wire-tap device that plugs into computer networks and eavesdrops on the network traffic is known as the Packet Sniffer or protocol analyzer. Same as we tap any phone call this sniffing allows us to listen to communication between two or more computers. Computer conversations consist of apparently random binary data. Therefore, network wiretap programs […]

    Read more →

    Firewalk Attack: Beyond The Boundaries of Security.

    by  • March 21, 2009 • Amol Wagh, Core Security, Ethical hacking, Exclusive, Student Series • 0 Comments

    Firewalk which was developed by two masterminds known as developed by Mike Schiffman and Dave Goldsmith furthers the techniques used both by static port traceroutes and hping. It can be successfully implemented to scan a host downstream from a security gateway to assess what rules relate to the target system, without any packets having to […]

    Read more →

    After Suspecting Hackers On SBI Website, Bank Shut Off Its Corporate Website

    by  • December 28, 2008 • Amol Wagh, Latest News • 0 Comments

    This Wednesday, The Security of State Bank Of India (SBI) Noticed that the traffic suddenly increased on their corporate website www.sbi.co.in . By suspecting this is a try from hackers who are trying to get information about the website for further break-in attack they temporarily shuts down the this website as a security measure. The […]

    Read more →

    Nokia Developer Conference 2009 In India

    by  • December 26, 2008 • Amol Wagh, Exclusive, Latest News • 3 Comments

    Nokia is ready to set another benchmark this year for mobile application developers and IT industry by announcing its ‘Nokia Developer Conference 2009’ In Bangalore, India. The basic concept behind this conference is creating a forum where knowledge of developers across the nation will be shared. Presentation on various mobile technologies, developers success stories and […]

    Read more →

    IP Spoofing Attack

    by  • November 1, 2008 • Amol Wagh, Core Security, Ethical hacking, Exclusive, IP, Network Security • 2 Comments

    Internet Protocol i.e IP addresses are unique and used for digital data communication for internet. Any mailing system or website technology works on the same principle of digital communication. Every computer connected to Network have its unique IP address. When Person A sends an email  to person B, The mail is assigned with the header […]

    Read more →