Skip to main content

Narishakti Zindabad

Happy International Women's Day

" There is no limit to what we, as women can accomplish


On this auspicious day 'Women's Day', Not only Do they face Molestations and Physical threats but Cyber criminal out there think women as a easy target, but let me tell you that yes you are the most powerful and no one should think that Women is a easy target for any Crime.

Power, Knowledge, and Money are the most important one, Power is Shakti and Shakti is Woman, knowledge is Saraswati and Saraswati is Woman, Money is Laxmi and Laxmi is Woman. So what is the need of underestimate, You are Powerful.

Narishakti Zindabad.....!

In the society, where women is only as good as her cooking Show them that you can bake and earn your own bread. Show them the tremendous strength,courage and intellect you have got. Show them who you really are. Make theme feel intimidated of your capabilities and envy of your audacity. Listen to no one and just your heart achieve heights, go places.

Follow your passion to break all the barriers of patriarchy.

You boss lady ! Hold your crown high, fight hard, don't give up and most importantly " Break the Bias". There is no limit to what we, as women can accomplish.

Once again,Happy international women's day !!

Comments

Popular posts from this blog

Master Kubernetes: Architecture, Commands, and Real-World Applications

Kubernetes Basics for DevOps & DevSecOps Kubernetes Basics for DevSecOps 1. Introduction to Kubernetes In the early days of deploying applications, we used to run them directly on physical servers. This approach was inflexible and inefficient — if one application needed more resources, it could starve others. Virtual machines (VMs) improved this by isolating workloads, but they were heavy and took time to provision. Then came containers. Containers are lightweight, portable, and can run anywhere — your laptop, a server in the cloud, or even a Raspberry Pi. But managing containers at scale quickly becomes a nightmare. Imagine you have 500 containers — how do you start them, stop them, update them, and ensure they recover from failures automatically? Enter Kubernetes — an open-source container orchestration platform that automates deployment, scaling, and management of containerized applications. It was originally developed by Google and i...

Protecting Yourself from Vishing & Smishing frauds in India

Awareness is necessity Vishing & Smishing fraud is a type of scam that involves the use of text messages and Voice calls to trick individuals into revealing sensitive personal information such as bank account details, passwords, and credit card numbers. This type of fraud has become increasingly common in India, with many people falling victim to these scams every year. In this blog, we will discuss what Vishing & Smishing frauds are, how it works, and what steps you can take to prevent falling victim to these scams. What is Vishing & Smishing Fraud? Vishing & Smishing fraud is a type of social engineering scam that involves the use of text messages and Voice calls to trick individuals into revealing sensitive personal information. The term "vishing" is a combination of "voice" and "phishing," which refers to the use of voice calls to trick individuals into revealing personal information. In "Smishing" fraud, scammers use t...

Exploiting and Securing GitLab: Lessons from a TryHackMe Lab

Perimeter security isn’t enough—because sometimes the threat is already inside. In this blog post, I’m sharing what I learned from a hands-on TryHackMe lab on GitLab security . It revealed how a simple internal misconfiguration—like open registration or overly permissive repo access—can lead to major data exposure inside an organization. I’ll walk you through the red team perspective on exploiting a misconfigured GitLab instance , and then flip the script to explain how you can secure your own internal build systems . Scenario: Inside the Walls of a Large Organization Think of a large organization—like a bank—with thousands of employees and multiple teams handling development, IT operations, and security. To keep intellectual property (IP) secure, these organizations often host self-managed GitLab instances on their internal network. But here’s where things can go wrong: GitLab is hosted internally Allows anyone on the internal network to register Has some projects...

A new WhatsApp Scam : Amazon's 30th anniversary celebration free gifts!

Awareness is necessity One of my friend sent a message yesterday asking me to take a survey to claim free gifts as part of Amazon’s 30th Anniversary celebration. Did you receive this kind of message ? If yes then beware !!! It’s a new whatsapp scam. " Letme inform you first that according to WIKIPEDIA Jeff Bezos founded Amazon in July 1994. Now count the years . It's only 26 years. And here in the title they mentioned a 30th anniversary celebration. There are several ways to identify the link whether it is original or fake. When users click on the message, a new window opens saying “Congratulations, you have been chosen to participate in our survey”. Users are asked to answer four questions. After the user submits the answers , Bunch of gift boxes appears on the screen asking user to make a selection. In most cases it is the Huawei Mate 40 pro . I marked red squares on screenshots , when you try to click on that button or sign-in la...

PRIZE SCAM: If you have to pay to get the prize, it's not a prize

Awareness is necessity Have you ever got any calls stating that you have won a prize or lottery from any online shopping website? The chances are these calls are fraud As a Cyber volunteer, I have analyzed some case studies of these kinds of frauds. Let’s understand how this type of fraud happens !! The fraudster calls you imposing as an employee from any trusted online shopping site. They try to convince you by giving you the details about your last purchase from the site, with the product and order details. When a person believes that the fraudster is an employee from the online site, they give them attractive schemes about different prizes like laptop, T.V, mobile phones and give an option to select one prize from them.When you show some interest and select a prize from the mentioned prize, they send us a link as SMS. The link sent is the fraud link which asks for our registration details like bank details as well as personal information. While regis...

Email Security Deep Dive: 13 Steps to Keep Your Emails Safe

Email Security Checklist The Email Security Checklist 1. Enable SPF (Sender Policy Framework) What it is: SPF is like a guest list for your email domain. It tells the world that only specific servers are allowed to send email for your domain. How it works: Publish an SPF record in DNS. When someone receives an email claiming to be from your domain, their mail server checks if the sending IP is listed in the SPF record. If the IP is not listed, the email is rejected or marked as spam. Example SPF record: v=spf1 ip4:203.0.113.0/24 include:_spf.google.com -all Only servers in the specified IP range and Google’s mail servers can send emails for this domain. Others are rejected. Points to Note: Prevents attackers from spoofing your domain and sending phishing or spam emails. 2. Enable DKIM (DomainKeys Identified Mail) What it is: DKIM is a digital signature for each email, ensuring that the message hasn’t been tampered with. Ho...