PinnedAvi JainDifferent Modes in Google Chrome VS Virtual Private NetworkUsers can surf the web in a variety of ways with the Google Chrome web browser. Because what you do online is private, Google Chrome…May 30, 2022May 30, 2022
PinnedAvi JainImportance of Encryption: Reversible VS Non-reversible EncryptionData is becoming increasingly important in our personal lives, as well as our economic success and security. That information must be kept…May 9, 2022May 9, 2022
PinnedAvi JainSteganography- Hiding secrets inside Images and Audios!What is Steganography?Nov 2, 20212Nov 2, 20212
PinnedAvi JainRed Team VS Blue Team VS Purple Team!!!The act of safeguarding the organization from cybersecurity attacks or utilizing and discovering the talented employees of the firm can be…Oct 21, 20216Oct 21, 20216
PinnedAvi JainCryptography-Study of Secure Communication!WHAT IS CRYPTOGRAPHY?Oct 8, 20213Oct 8, 20213
Avi JainCause of Cyber Attacks on Digital Currencies!The “criminal use of cryptocurrencies” was one of the top three recorded instances of the year, according to the security threats…Dec 29, 2022Dec 29, 2022
Avi JainCyber Kill Chain- A Cybersecurity Model.Cyber Kill Chain is basically a series of steps that consists of 7 phases used to combat a security attack. It is cybersecurity model that…Sep 21, 20216Sep 21, 20216
Avi JainConfidential Computing-An important Security Strategy.Confidential Computing (CC) is a Cloud Computing technology which is essentially used for encrypting data to isolate sensitive information…Sep 5, 20219Sep 5, 20219
Avi JainMy journey towards the path of Cyber Security and ahead!Every person has their core and their life revolves around it.Aug 18, 20213Aug 18, 20213