Yearly Archives: 2015

/2015

Ruby 2.3.0 Released With New Features And Performance Improvements

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Designed and developed by Yukihiro “Matz” Matsumoto of Japan, Ruby is a dynamic, object-oriented, and general-purpose programming language. With the introduction of Rails web framework, Ruby has attracted programmers from all over the world who have worked hard to “make Ruby natural, not simple”.

Just a few […]

By |December 29th, 2015|Papers|

Interesting Facts About Computer And Internet You May Not Know

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Here is a list of interesting facts about Computer and Internet that might make you surprise. In this list the image belongs to respect to author and we don’t own any one of them.

The first actual computer “bug” was a dead moth which was stuck in a […]

By |December 28th, 2015|Papers|

Banks Mum Over Credit Card Flaw: Because Fraud Is a Profitable Business?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

So who is at bigger risk? Consumers or the banks? Eventually, who is going to earn more money from the plastic, banks or the customers? In the core of the whole talk, the question finally boils down to the fact that “Is fraud a profitable business […]

By |December 28th, 2015|Papers|

You Can Now Remotely Turn Off Any Android Smartphone/Tablet By Sending SMS

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Android is the most popular and widely used operating system in the world, which offers a lot of features to its users. To make Android more user friendly, a lot of apps are being developed to run on this OS.

In this article, we will discuss about […]

By |December 28th, 2015|Papers|

Do you know why some apps and games arrive in iOS first and then Android?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Have you ever thought as to why many top mobile apps and games come to iOS before they come to Android? Lot of talks have been going around the uniqueness of Android and iOS platforms.

Apple, the biggest phone manufacturer had developed its own operating system called […]

By |December 27th, 2015|Papers|

How To Create A Super Secure Password To Defeat Hackers

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

With the ever-increasing hacking attacks, the importance of a super strong password can’t be denied. In the year 2015, we saw an insane amount of hacking attacks that leaked people’s personal data and costed the multinationals millions. Throughout the year, we told you about various attacks […]

By |December 27th, 2015|Papers|

Opening for Network Security — Noida

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Job Profile:

• Vulnerability Assessment
• Penetration Testing (Internal & External)
• Servers Configuration Hardening
• Network Configuration Hardening
• Network Performance Analysis
• Log Analysis of Servers & Network Devices
• Network Security Architecture Review (optional)
• Gap Analysis as per ISO 27001 (optional)
• Risk Assessment (optional)
• To meet the On time delivery […]

By |December 21st, 2015|job|

Openin for Security Operations Analyst – BMC Software

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

BMC is recruiting analyst who are result oriented, multi-disciplined and comfortable in operating and maintaining secured solutions for platforms running mission critical business applications in a homogeneous environment, at the enterprise level. The person is expected to work both independently and with team of other Security […]

By |December 21st, 2015|job|

Opening for NETWORK SECURITY CONSULTANT (VA/PT) — Coimbatore

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

NETWORK SECURITY CONSULTANT — VAPT
Send your CV to hr@pcsuae.com

 

Position Title
Network Security Consultant

Role & Responsibilities

Conduct internal vulnerability assessment and risk assessment at client places
Conduct penetration testing or ethical hacking using open source and commercial tools
Conduct application assessment
Documenting reports with clarity, and issuing findings with effective recommendations
Mitigate vulnerabilities identified […]

By |December 21st, 2015|job|

Opening for Security Analyst – Hyderabad

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Job Type: Security Analyst

Location: Hyderabad, India

Company Information: www.eiqnetworks.com

Description: EiQ Networks is looking for an experienced candidates to join our team supporting a large and rapidly growing security product.

Key Responsibilities:

good understanding of security technologies and experience in 24*7 environment handling large enterprise customers
Should have strong knowledge of […]

By |December 21st, 2015|job|