- 77
- 72 680
An IT Learner
India
Приєднався 5 жов 2011
Hi I am a Network Security professional and working for a well known MNC.
I do make videos as these helps me in my career goals and I also think that we can increase our knowledge by sharing it with other.
"बाटने से ज्ञान बढ़ता है"
Please subscribe this channel and share my Vidoes to support me in this journey.
I do make videos as these helps me in my career goals and I also think that we can increase our knowledge by sharing it with other.
"बाटने से ज्ञान बढ़ता है"
Please subscribe this channel and share my Vidoes to support me in this journey.
Integrity Check Using MD5 Hashing #DigestValue #integrity
In this video, we have explained Integrity check and also shown an example by performing a lab.
Переглядів: 21
Відео
Password Hash Storage Explained with Example #hashing #securepasswords #MD5 #cybersecurity
Переглядів 47День тому
In this video, we discussed about Password Hash Storage technique. We explained with example that how your passwords are protected and even if it gets compromised, the hackers can't use it. #Password #database #cybersecurity #nwkings
IP Subnetting | Network Subnetting Explained
Переглядів 2742 місяці тому
In this video, we’ll break down the concept of subnetting, making it simple and easy to understand, even if you're just starting out with networking. Subnetting is an essential skill for network administrators, and knowing how to divide a network into smaller, more efficient sub-networks can save you time, resources, and improve overall network performance
Explaining Phishing Attack | Vishing | Smishing | Fake Email
Переглядів 262 місяці тому
In this video, we dive into the world of phishing scams, one of the most common online threats. You'll learn how cybercriminals use fake emails, messages, and websites to steal personal information like passwords, credit card numbers, and other sensitive data.
What is Cryptography ? Cryptography explained in Hindi with examples #Network Security #hindi
Переглядів 1039 місяців тому
In this video, we explained about cryptography that how it can be used to convert plain text into cipher text.
IP Spoofing Explained in Hindi #IPSpoofing
Переглядів 3,5 тис.Рік тому
In this video, we have explained IP Spoofing in Hindi.
BOT and BOTNET Explained in Hindi
Переглядів 279Рік тому
In this video, we have tried to explain Bots and botnets.
Check WiFi/SSID Password in Windows 10/11 Netsh Utility
Переглядів 818Рік тому
In this video, we have demonstrated to check the WiFi passwords that have been used in any Windows 10/11 devices. This video is not about knowing passwords of WiFi that we have not used ever.
DNS Poisoning | DNS Spoofing | Explained in Hindi
Переглядів 3,5 тис.Рік тому
In this video, we have explained DNS poisoning aka DNS Spoofing with real-life examples.
HTTP Response Status Code
Переглядів 533Рік тому
In this video, we have discussed HTTP status codes and some common response status codes of HTTP.
HTTP | Request Response | HTTP Method Explained in Hindi
Переглядів 5 тис.Рік тому
In this video, we have explained HTTP requests and responses and have discussed HTTP methods in detail.
Uniform Resource Locator (URL) Explained in Hindi
Переглядів 491Рік тому
In this video, we have explained the URL and its part in detail with examples.
Tracert or Traceroute Explained using Wireshark Capture | Hindi
Переглядів 1,6 тис.Рік тому
Watch Ping Video : ua-cam.com/video/5L4mkPRA2LU/v-deo.html Traceroute (or tracert in Windows) is a network diagnostic tool used to trace the route that data takes from one computer to another across a network such as the Internet. It works by sending packets of data, called probes, to the destination computer with increasing time-to-live (TTL) values, starting at 1 and incrementing by 1 with ea...
How Download Manager Works | How Torrent Works? | Resume Downloads explained in Hindi
Переглядів 96Рік тому
In this video, we have explained how the download manager works.
Ping Command Explained | ICMP | Hindi
Переглядів 1,7 тис.Рік тому
In this video, we have explained the working of the ping command and the protocol ICMP's echo request and response.
PAN,LAN,MAN,WAN | Types of network | Internet | Hindi
Переглядів 102Рік тому
PAN,LAN,MAN,WAN | Types of network | Internet | Hindi
On-Premise Firewall vs Cloud Firewall - How it works?
Переглядів 937Рік тому
On-Premise Firewall vs Cloud Firewall - How it works?
How DNS Flow Works in a Local Host | DNS Resolution | Host File | DNS Cache.
Переглядів 276Рік тому
How DNS Flow Works in a Local Host | DNS Resolution | Host File | DNS Cache.
TCP Series Part 3 | Source Port | Destination Port | Sequence and Acknowledgement Number | Hindi
Переглядів 224Рік тому
TCP Series Part 3 | Source Port | Destination Port | Sequence and Acknowledgement Number | Hindi
DNS Explained in Hindi | Use of DNS | Why DNS is important | Root name Server | TLD Server
Переглядів 373Рік тому
DNS Explained in Hindi | Use of DNS | Why DNS is important | Root name Server | TLD Server
Encryption vs Hashing Explained in Hindi
Переглядів 1,5 тис.Рік тому
Encryption vs Hashing Explained in Hindi
Why MAC addresses and IP addresses are important to communicate? Explained in Hindi
Переглядів 287Рік тому
Why MAC addresses and IP addresses are important to communicate? Explained in Hindi
What is the use of CNAME Record in DNS? Domain Maps to Domain Explained in Hindi
Переглядів 3,3 тис.Рік тому
What is the use of CNAME Record in DNS? Domain Maps to Domain Explained in Hindi
Networking Fundamentals | Network Traffic Flow | ARP | DNS | DHCP | HTTP HTTPS | SSL TLS in Hindi
Переглядів 860Рік тому
Networking Fundamentals | Network Traffic Flow | ARP | DNS | DHCP | HTTP HTTPS | SSL TLS in Hindi
Public vs Private IP Address Explained in Hindi
Переглядів 2,5 тис.Рік тому
Public vs Private IP Address Explained in Hindi
Simple Mail Transfer Protocol ( SMTP ) | Mail Flow | Mail Relay | Mail Submission in Hindi
Переглядів 726Рік тому
Simple Mail Transfer Protocol ( SMTP ) | Mail Flow | Mail Relay | Mail Submission in Hindi
Great explanation
Hey, it would be awesome if you could explain that with a packet capture.
Definitely...will post a video soon. Thank you for the feedback.
What is the exact meaning of * in traceroute output
That means a timeout, when a host does not respond to the ICMP request it shows an *
Sahi h yaar
Wonderful explanation thank you sir
Thank you
can you tell the commands for a DNAT for cisco router?
Hacking Tutorial Full Banao
Wo to mujhe bhi sikhna padega pehle
Good one Thank you
Good job brother. Thanks for sharing. Keep it up.
Thank you for your appreciation
Nice
Thank you
Really good video! Thank you for sharing.
Thank you, Appreciate your feedback.
Put more description in video, put more keywords, it was hard to find this video.
Thank you for your feedback. I hope it helped
Helpfull 👍
Thank you
Thanks Sir😊
😊
Kya padhate ho bhai ...maja ajata hai
Bhai maze le rhe ya sach me acha laga
Na maane 💥
Are punia dada ....
Haaaaaaaa......@@akshatrathore9599
youtube per kisi ko ata he nai explain kerna? sahi me thoda toh acche se samjao
Thank you for your feedback..will try to improve
Nice
Thank you
If it is encrypted how security device can read that? 😢😢😢
That is known as SSL inspection..There should be a video on this topic in this channel.
*This site is not working now*
Sir ping me bare me video bnao
Video hai check karo
ua-cam.com/video/5L4mkPRA2LU/v-deo.html
Baskar bhai
Q?
well done sir
Thank you
bro please improve what you want to speak.....In someplaces you are looking like you are in hurry......
I agree, I will surely improve that. I appreciate your honest feedback.
Bhai Thora dhere bol lo kya hi smj lgega aese
Bhai..I appreciate your honest feedback. In new videos, I will try to be slow.
super sir
Bahut shukriya
suggest ke app jab bhi koi topic discuss krte ho bhle time thoda jada lage but ache se slow samjhao
Bahut shukriya for feedback. I will apply this from next videos.
ok hai but aap itna fast smjha rhe ho ke ek fresher ke upar se nikal jayega..kuch bhi nhi samajh payega
I understand, Agli videos me ye chiz ka dhyaan rakhunga
Doubt! In explicit proxy, we install app or add any extention in browser so that our system's Ip address get change but what will happen if there is any NAT configured in the default gateway
In explicit proxy, we can use any proxy address in the proxy settings of your device, you just have to have an authentication credentials for that proxy.
Sir aik help Chaiya
Tell me please
Well done sir keep it up 😊
Thank you
great work buddy
Thank you
why don't the local DNS send the iterative query directly to authoritative server?
I think a DNS forwarder needs to be created for that. A DNS administrator can help you more on this.
thanks bro
Thank you
Thank you
Hum Mail Relay kyun use kerte hein? Especially for scan-to-email.
SMTP relays are used to send emails...in most cases, it is used to forward bulk emails
Gaming mein ping kyun high hoti hai? Speed bhi fast hoti hai.
Gaming server busy ho yaa apke network se gaming server ka route busy hota hai to ping high hoti hai
@@AnITLearner Mere network se gaming server ka route busy ka kaise pta lgay ga?
@@AnITLearner Mere network se gaming server ka route busy ka kaise pta lgay ga?
londa acche se sikha
You are the best 💕.
Thank you
Kya gazab explain kiya hai aapne😮. Being a proxy engineer, i can understand your intelligence level ❤❤. Thank you so much.
Thank you. Means alot
nyc
Virtual machine creation is easy to understand, but VLAN creation is hard to understand. VLANS are created in firewall/routers or switch. please explain.
VLANs are created on switch but to do intervlan routing you have to use a L3 device.
very good
Thank you
Sir aapko padane nhi aa rha haj
Sikh jayenge 😊 thank you for genuine feedback.
pahle comment pad lena chahiye tha 6 minute kharab karne ke baad bhi samjh nhi aaya
Mitigation: for ip spoofing any rule set on firewall. How to fix it.
One should always try to prevent it and one of best method to prevent it is authentication. It is almost impossible to prevent it on open networks but firewalls are designed to detect and block such addresses doing attack using IP Spoofing. It is one of the most dangerous attack.
But this cmd only we can use while we connected with any SSID, without any connection we can't find out right?
There could be different way and that is considered as hacking.
@@AnITLearner no I'm asking if we don't have connected with any ssid then ? How can we find out password?
I understand, that is what I am saying. If we are not connected to any SSID that means we are not the owner and we want to know password of the SSID that we are seeing. If we own those SSId, we can simply check by login to router.
Well explained.
Thank you
Watched full video and now dns poisoning, dns and phishing is clear. Well explained
Thank you
Thanks a lot for this video
Very informative great video 👍👍👍
Thank you