Vedant KhandelwalHow to Fix the CrowdStrike Driver Folder on Different Cloud PlatformsAWS EC2Jul 19Jul 19
Vedant KhandelwalinSystem WeaknessHow to Manipulate Browser Search History on Linux SystemsEarlier this month I developed a keen interest onto forensics, cd-ing around into my system led me to find the sqlite Database storing your…May 22May 22
Vedant KhandelwalSetting up Arch Linux for HackingIf you’re a Linux enthusiast who wants more control over your system, Arch Linux is a popular choice. This distribution is known for its…Apr 26, 2023Apr 26, 2023
Vedant KhandelwalCybersecurity Risks and Solutions for the Healthcare Industry: Protecting Sensitive Data in 2023The healthcare industry is one of the most heavily targeted sectors for cyber attacks due to the high value of patient data. In 2023…Apr 14, 2023Apr 14, 2023
Vedant KhandelwalKali Purple: The Game-Changing Defensive Security OS You Need to Know AboutAs the world becomes increasingly digital, the importance of cybersecurity cannot be overstated. Cyber threats are now a daily reality for…Mar 15, 2023Mar 15, 2023
Vedant KhandelwalNavigating Authorization and Authentication in the Digital AgeAuthentication :Feb 28, 2023Feb 28, 2023
Vedant Khandelwal[OBSOLETE] Installing Intel Unison on Windows 10Windows Phone Link was good, but what if you’ve got an iPhone and stayed back with Windows10?Feb 10, 20231Feb 10, 20231
Vedant KhandelwalAvoid falling to phishing scamsWhat are few steps employees can do to avoid falling victim to #phishing scams? 💻Dec 6, 2022Dec 6, 2022
Vedant KhandelwalSteps to be taken after a data breachIt’s a scenario no company wants to experience, but must prepare for. What essential steps must a company include in their data breach…Nov 22, 2022Nov 22, 2022