What's new

Search results

  1. S

    Fully operational Nuclear Triad by 2012- Navy Chief

    When will INS Arihant will have K15 Sagarika operational , further do it is comparable with Tomahawk Cruise missile , if range of missile is not good how can it effect INS Arihant kill capability.? Seniors please put light
  2. S

    Breaking on Tarmak007: Tejas LSP-5 to fly today

    Seniors what is difference between LSP 4 and LSP 5 and how many more versions are yet to come, aslo do we are developing our own avionics ?
  3. S

    Best Ever LCA - Tejas Pics Collection !

    DO we are building our AESA ?
  4. S

    Kaveri Engine Project update

    Seniors, 1)When we can expect the final outcome , when kaveri will be used in LCA.Hope someone will tell.Do want trollers reply.
  5. S

    India readies cyber army to hack into hostile nations' computer systems

    Vulnerability and penetration testing is done by banking and finance industries etc.So this should not be taken as surprise only way to judge your security is to run vulnerability assessment tools and later exploiting it. So if they are doing that this is not new. I am also into same feild.this...
  6. S

    India readies cyber army to hack into hostile nations' computer systems

    First of all comparison cannot be made , Information security is huge it has many branches and research can be done on each and every aspects it goes beyond site deformation.
  7. S

    India readies cyber army to hack into hostile nations' computer systems

    US have that power they spend huge sum in R&D we all are using 90% of internet protocol(my assumtion :) ) made in US varsities and in western country in fact TCP/IP was made for US DEFENCE project but later used as publicly ,So they invest in developing new means of securing assets,new...
  8. S

    India readies cyber army to hack into hostile nations' computer systems

    You got is wrong. There are different types of exploitations a) Script kiddy these rum automated tools to launch attack 2) People who can launch precise attack with knowledge of web application exploitation and can form their own tools inperl and python and can use ruby languages in...
  9. S

    India readies cyber army to hack into hostile nations' computer systems

    Tshering i live in mumbai our community is well capable to launch attack . But Tshering we are in initial satage in contrast western countries invest money to R&D for non traditional exploitations. CIA has capability to break codes etc
  10. S

    India readies cyber army to hack into hostile nations' computer systems

    How you came to know china hacked into pentagon . What is hacking ? Pakistani hacked into PC of Indian army does not say hacker is genious . People are unaware of security issues and by simple tricks one can brek into systems . But to break into oranisation where security is properly appllied...
  11. S

    India readies cyber army to hack into hostile nations' computer systems

    Yes you are right most of the vendors are promising with zeroday attack measures.Security is very complex and have many branches, Application security to network security all these have to work in relation to each other in biger organisation like BCP and risk assesment and proper process and...
  12. S

    India readies cyber army to hack into hostile nations' computer systems

    Most of the attacks coming are now days are more sophisticated and are based on web application exploitation.Other exploit unpatched devices.Some scientist now at blackhat conference said that SSL based vpn can also be cracked as per their research.Governments certainly posses that power so we...
  13. S

    IMSc unveils India's seventh-fastest supercomputer `Annapurna' news

    In 20 years time more's law is going to fail as electron at that level will be unstable hence quantum computing(till now we achieve it at level of 7 electrons) will come into picture . You can imagine that in 20 years of time todays fastest supercomputer will we used by you as general...
  14. S

    IMSc unveils India's seventh-fastest supercomputer `Annapurna' news

    Dear Friends, Supercomputer application is important for our country in some feilds.When earlier we need it for ur weather stations we demanded it from US but US denied it to us so we created our own PARAM PADMA. This machines performs trillion of calculations per seconds these are important...
  15. S

    Pakistani server used to hack Indian Army officer’s computer

    1) Properly configured firewall does not grantee security . Security is a multilayer approach. 2) What is physically fixed bug? 3) Honey pot allow us to study what attacker using (tools , measures,etc) .I would prefer SIEM instead of this one . It is normally easy for good cracker to...
  16. S

    Pakistani server used to hack Indian Army officer’s computer

    You can see this as terrorist does not need planning to attack any vulnerability of armed forces ,civilian organizational they can rise from abyss and attack. But security forces have to do multilayer protection right from border of nation to security of school this does not mean...
  17. S

    Pakistani server used to hack Indian Army officer’s computer

    Honeypot does not infect .ITS is a formof IPS that used to study attacks.Although after applying Network Security (firewall at perimeter ,IPSIDS then Kernel level HIDS ) organizations thinks there job is done . But it is not correct you have to constantly monitor traffic ( We also Study...

Back
Top Bottom