Firewalllearning.com https://www.firewalllearning.com Tue, 09 Aug 2016 09:37:21 +0000 en-US hourly 1 https://wordpress.org/?v=4.5.3 Ethical Hacking Workshop by FLS in NIST college at Rajampet. https://www.firewalllearning.com/ethical-hacking-workshop-fls-nist-college-rajampet/ Wed, 05 Nov 2014 12:08:03 +0000 https://www.firewalllearning.com/?p=2645 Ethical Hacking Workshop by Firewall Learning Solution in NIST college at Rajampet.

The post Ethical Hacking Workshop by FLS in NIST college at Rajampet. appeared first on Firewalllearning.com.

]]>
Ethical Hacking Workshop by Firewall Learning Solution in NIST college at Rajampet.

[See image gallery at www.firewalllearning.com]

The post Ethical Hacking Workshop by FLS in NIST college at Rajampet. appeared first on Firewalllearning.com.

]]>
PreCRT programme in Tirupati https://www.firewalllearning.com/precrt-programme-tirupati/ Sat, 18 Oct 2014 11:53:14 +0000 https://www.firewalllearning.com/?p=2638 PreCRT programme in Tirupati

The post PreCRT programme in Tirupati appeared first on Firewalllearning.com.

]]>
PreCRT programme in Tirupati

[See image gallery at www.firewalllearning.com]

The post PreCRT programme in Tirupati appeared first on Firewalllearning.com.

]]>
Ameerpet Office Pics https://www.firewalllearning.com/ameerpet-office-pics-4/ Sat, 18 Oct 2014 11:51:52 +0000 https://www.firewalllearning.com/?p=2635 Ameerpet Office Pics

The post Ameerpet Office Pics appeared first on Firewalllearning.com.

]]>
Ameerpet Office Pics

[See image gallery at www.firewalllearning.com]

The post Ameerpet Office Pics appeared first on Firewalllearning.com.

]]>
Ethical Hackers to get a new lab courtesy Trustwave https://www.firewalllearning.com/ethical-hackers-get-new-lab-courtesy-trustwave/ Fri, 19 Sep 2014 11:03:28 +0000 https://www.firewalllearning.com/?p=2320 Ethical Hackers to get a new lab courtesy Trustwave Unethical hackers nowadays look to exploit the security vulnerabilities in the routers and PIN-pads. The hackers at the Trustwave are ethical and try to reduce such type of unethical hacking. It…

The post Ethical Hackers to get a new lab courtesy Trustwave appeared first on Firewalllearning.com.

]]>
Ethical Hackers to get a new lab courtesy Trustwave

Unethical hackers nowadays look to exploit the security vulnerabilities in the routers and PIN-pads. The hackers at the Trustwave are ethical and try to reduce such type of unethical hacking. It is a cyber security firm which has opened its lab at its Chicago headquarters this summer. The hackers of the firm check the commonly hacking targets of the immoral hackers which includes webcams, PIN-pads, ATMs and routers. Some of the vulnerabilities are checked by the hackers in the firm on the specific client’s request while others are done by the Trustwave itself. The main motive of the lab is to find various problems in the system before the unethical hackers do and then try to improve the security system and reduce the chances of hacking.

Trustwave hacker Matthew Jakubowski said that they deeply study the consumer based electronics such as cellphones and webcams, as they have a very complex system which leaves more paths for security breaches. The main aim of the lab is to reduce the cases of immoral hacking done by the unethical hackers. Jakubowski said they developed vulnerabilities in the lab and he also said the not all the vulnerabilities require extensive computer knowledge, some of them are common security failures such as forgetting to change the pin of the ATM after it has changed hands.

Everybody has not advanced computing skills, still some common easy steps can help them to prevent to protect their devices. For example, wireless routers can me made secure by regularly checking for updates. Some devices are updated automatically but on the other hand for some devices you have to go online and update it manually, Jakubowski recommend to perform such type of updates once in a month.

The post Ethical Hackers to get a new lab courtesy Trustwave appeared first on Firewalllearning.com.

]]>
Google Mail comes under attack as close to 5 million Gmail passwords are leaked https://www.firewalllearning.com/google-mail-comes-attack-close-5-million-gmail-passwords-leaked/ Mon, 15 Sep 2014 06:35:54 +0000 https://www.firewalllearning.com/?p=2310 Google Mail comes under attack as close to 5 million Gmail passwords are leaked The Google accounts, passwords for 4.93 million users being made public is one of the biggest hacking event that took place in the last few months.…

The post Google Mail comes under attack as close to 5 million Gmail passwords are leaked appeared first on Firewalllearning.com.

]]>
Google Mail comes under attack as close to 5 million Gmail passwords are leaked

The Google accounts, passwords for 4.93 million users being made public is one of the biggest hacking event that took place in the last few months. Recently Russian hackers hacked Google accounts of 4.93 million people and leaked the email IDs and passwords of all the users. The same Google accounts and passwords are used for all Google products such as Gmail, YouTube, Plus, Drive and Maps etc. A user named TVskit posted the details of the account on the Bitcoin forum btcsec.com and he also claims that 60% of the passwords are still active.

gamil passwords hacked

On the other hand Google in a blog post refused the claims by the hacker and said only 2% of the passwords are still active. The Google also said the its anti hacking system has blocked many login attempts. Google also said that it was not due to the breach in its security system.

In a statement issued following the breaking of the story, Google said that they had no evidence to suggest that their servers had been compromised. The passwords were most likely obtained through social engineering or other similar hacking processes.

Google said that these things are done by the combination of various other things. For example, if you use if you use the same username and password on various websites and any one of these websites gets hacked, then your details can be used to log in to others and the hackers can also use malware and phishing schemes to know your login details.

The post Google Mail comes under attack as close to 5 million Gmail passwords are leaked appeared first on Firewalllearning.com.

]]>
The speaker at the upcoming event on cyber security for using Sci Fi for examining the Real World Vulnerabilities of security https://www.firewalllearning.com/speaker-upcoming-event-cyber-security-using-sci-fi-examining-real-world-vulnerabilities-security/ Mon, 01 Sep 2014 06:31:05 +0000 https://www.firewalllearning.com/?p=2208 The speaker at the upcoming event on cyber security for using Sci Fi for examining the Real World Vulnerabilities of security The rocket city takes down Con, which was presented by the EC Council Federation & Dynetics, is a conference…

The post The speaker at the upcoming event on cyber security for using Sci Fi for examining the Real World Vulnerabilities of security appeared first on Firewalllearning.com.

]]>
The speaker at the upcoming event on cyber security for using Sci Fi for examining the Real World Vulnerabilities of security

The rocket city takes down Con, which was presented by the EC Council Federation & Dynetics, is a conference which is being organized for security of the information technology systems. This conference is being organized for offering advanced training on hacking, networking as well as speakers. Kellman Meghu would be speaking at the Take Down conference in comparison of the threat of the real world and the famous Sci-Fi story.

At the Rocket City Take Down conference, Kellman Meghu will be examining the real world persistent and advanced threats to the complex infrastructure with the help of entertaining and attractive allusions to that of the famous Sci-Fi story line in which the mythical Galactic Empire suffers from a prominent loss of data which destroys the complex infrastructure eventually. Kellman Meghu will be exploring that what would have happened if a definite plan of security would have been in place. He will be reexamining the whole situation for understanding how the basic approaches of policy also might have saved the business of the Empire, the lives of the employees and also a billion dollars.

Meghu is the Head of the engineering security of Canada and also the Central United States for check point software technologies Inc. He will be performing a postmortem on a galactic empire from the point of view of the Security audit at the Rocket City Take Down Conference. This conference has been scheduled for August 18th-19th at the Dynetics Solution Complex, Huntsville with also a pre conference which will start from August 14th-17th.

With more than twenty years of professional experience in the deployment of the applications protection and networks based security, Meghu has given consultation on different strategies of the network’s security. He was also involved in the audits of security and the deployment of security infrastructure for different government and commercial entities, all throughout Canada as well as The United States. He holds experience in the daily operational activities in the crucial networks of security, planning policies, documentation and management. He participates in a number of conferences and his employment of Sci-Fi for addressing the challenges related to security of cyber, is quite popular with the audiences.

Rocket City Take Down Conference would be featuring 2 very dynamic paths in 2 days of the conference. Monday will be focusing on the attack. This will teach the delegates that even the most well protected systems may be breached. Tuesday will be focusing on defense. The topics which will be featured will challenge the attendees for determining if the mechanisms of defense are well prepared for thwarting persistent and nefarious attacks.

The Academy of Training will be offering 4 days of aggressive training just before the conference will start. The Council of EC’s certified ethical hacker, certified security analyst the certified hacking forensic investigator, securing windows infrastructure, mobile hacking and the forensics; advanced network defense would be some of the topics to be discussed.

Eric Lopez, the Director of the EC Council, said that they are quite pleased in offering training in conjunction with the training which will allow the participants to use the Travel, money and time efficiently. They have the most sought after certification and training classes which are conducted by the top organizations which give training.

The post The speaker at the upcoming event on cyber security for using Sci Fi for examining the Real World Vulnerabilities of security appeared first on Firewalllearning.com.

]]>
Rajeev Security Analyst https://www.firewalllearning.com/rajeev-security-analyst/ Sat, 30 Aug 2014 09:50:51 +0000 https://www.firewalllearning.com/?p=1978 My life has completely changed with my joining at FLS. The career designed course  CNFS has completely given me a perfect confidence to be a good part of the information security field.The firewalls taught here at FLS are the best…

The post Rajeev Security Analyst appeared first on Firewalllearning.com.

]]>
My life has completely changed with my joining at FLS. The career designed course  CNFS has completely given me a perfect confidence to be a good part of the information security field.The firewalls taught here at FLS are the best & for sure no institute can provide the perfect training as provided here.I can proudly say that i am the student from FLS .

The post Rajeev Security Analyst appeared first on Firewalllearning.com.

]]>
https://www.firewalllearning.com/1975-2/ Sat, 30 Aug 2014 09:48:28 +0000 https://www.firewalllearning.com/?p=1975 Name: Rajeev Designation: Security Analyst Company: RED SHIFT NETWORKS

The post appeared first on Firewalllearning.com.

]]>
rajeeve placement form flsName: Rajeev
Designation: Security Analyst
Company: RED SHIFT NETWORKS

The post appeared first on Firewalllearning.com.

]]>
Avinash Bastia Firewall Remediation Engineer Accenture https://www.firewalllearning.com/avinash-bastia-firewall-remediation-engineer-accenture/ Sat, 30 Aug 2014 09:39:00 +0000 https://www.firewalllearning.com/?p=1972 Hi , This is Avinash from Odisha, I want to pay my thankful gratitute to FLS Hyderabad for making excellent course. I did my CNFS (Certified Network & Firewall Specialist). Because of this course I got place in Accenture Hyderbad as Firewall…

The post Avinash Bastia Firewall Remediation Engineer Accenture appeared first on Firewalllearning.com.

]]>
Hi , This is Avinash from Odisha, I want to pay my thankful gratitute to FLS Hyderabad for making excellent course. I did my CNFS (Certified Network & Firewall Specialist). Because of this course I got place in Accenture Hyderbad as Firewall Remediation engineer”.I guess I am bit luckly to get Job in firewalll, being as a fresher.

All thanks to Mr Pradeep sir,Amar sir,Veera Reedy sir.

Thanks & Regard
Avinash Bastia
Firewall Remediation Engineer
Accenture Hyderabad
ph

The post Avinash Bastia Firewall Remediation Engineer Accenture appeared first on Firewalllearning.com.

]]>
https://www.firewalllearning.com/avinash/ Sat, 30 Aug 2014 09:14:39 +0000 https://www.firewalllearning.com/?p=1959 Name: Avinash Designation: Remediation Engineer Company: Accenture

The post appeared first on Firewalllearning.com.

]]>
pardhivName: Avinash
Designation: Remediation Engineer
Company: Accenture

The post appeared first on Firewalllearning.com.

]]>