SlideShare uma empresa Scribd logo
ONLINE SEFTY AND AWARNESS
OF OPERATION AND SECURITY
OF DIGITAL DEVICES
MEHEDI HASAN
JOB EXPERIENCE: 16 YEAR
Adviser CCA foundation
LOGIK EYE FORENSICS
Indonesia
Malaysia
Vietnam
Singapore
India
Thailand
Nepal
China
Jakarta, Bali, Sumatra (3)
Kualalampur (2)
Ho chi min, Hanoi (2)
Singapore City (3)
Delhi, Agra, Kolkata, Chennai
Bangkok, Pataya, Puket
Kathmandu
Shanghai, Beijing
Sri Lanka Colombo
A Business man lives in
Dhaka. Used to social
media for business and
relation.
He receive a phone
call from an unknown
number.
Biggest cyber crime
involving privacy
invasion in the world!
CASE STUDY
WE CAN START NOW
CYBER CRIME
INTRODUCTION
Topic of the section Cyber
crime, Cyber Attacks,
Hacker, Hacking etc.
TYPES OF CYBER ATTACKS
Topic of the section,
Malware, Virus, Trojan,
Steps of hacking etc
IMPACT OF INTERNET
Topic of the section, Positive
and negative impact of
internet.
01
02
03
04
05
06
SOCILA ENGINEERING
ATTACKS
Steganography, Data hiding
technology, Encryption,
Decryption, Spoofing, etc
DIGITAL FORENSICs
ATTACKS
Evidence collection, Types of
forensics, different types
of technique, Anti-
Forensics, tips of analysis.
SECURITY AND SEFTY
Strong password, Device
security, Smartphone
security, malware
detecting, cleaning etc
HACKING: Unauthorized access in a system
জালিযালি এবং আলথিক অপরাধ
সাইবার সন্ত্রাস ও চাাঁদাবালজ, হযরালি ও হুমলক ধামলক
পিিগ্রাফী ধারি, সংরক্ষণ, লবিরি, সহাযিা
সাইবার যুদ্ধ
অিিাইি জুযা
অিিাইনি কাউনক আঘাি করা অপদস্থ করা
ফফক আইলি / ছদ্দনবশ ধারণ
Phishing Attack
Man-in-the-Middle Attack
SQL Injection Attack
Denial-of-Service, Brute-Force and Dictionary attacks
XSS Attacks
Ransomware Attacks
Malware Attack
Session Hijacking
Zero-Day - Attack
TYPE ATTACKS
WEB BASED
DEVICE BASED
WEB-BASED ATTACKS
INJECTION ATTACK
DENIAL OF SERVICE (DOS)
BRUTE FORCE
PHISHING ATTACKS
WEB-BASED ATTACKS
SYSTEM-BASED ATTACKS
CYBER ATTACKS AND CRIME
STEPS OF CYBER CRIME
STEP 1: IDENTIFY THE VICTIM
STEP 2: INFORMATION GATHERING.
STEP 3: IDENTIFY LOOPHOLE.
STEP 4: ACTUAL HACK.
STEP 5: ESCAPE WITHOUT TRACE.
Hacking into computer, is just like breaking into a house
WWW.ANONYMIZER.IN/FAKE-MAILER/
Email Spoofing is the art of sending a spoofed email from somebody else’s email account.
PHISHING ATTACKS
Phishing is the attempt to acquire sensitive
information, often for malicious reasons, by
masquerading as a trustworthy entity in an electronic
communication
PHISHING USING WEBSITE
SET (SOCIAL ENGINEERING TOOLKIT)
HTML/JAVA SCRIPT VIHSING
APK TERMUX
PHISHING ATTACKS
SET (SOCIAL ENGINEERING TOOLKIT)
PHISHING ATTACKS
Phishing java script code
PHISHING ATTACKS
www.virustotal.com
Viruses
Trojans
Rootkits
Worms
Spyware
Crimeware
Adware
MITM attack is a general term for when a perpetrator
positions himself in a conversation between a user and an
application—making it appear as if a normal exchange of
information is underway.
INTERCEPTOT
Hardware Keylogger
INVESTIGATIONS
FORCE STOP THE APPS
ROOT THE DEVICE
EXTRACT SYSTEM
https://youtu.be/ZF6dc6nt25U
USE UPDATED ANTIVIRUS
SCAN YOUR SYSTEM REGULARLY
SCAN FLASH MEDIA/DRIVE
BEFORE USE.
IMPACT OF INTERNET
IMPACT OF INTERNET
IMPACT OF INTERNET
NEGATIVE IMPACT
POSITIVE IMPACT
IMPACT OF INTERNET
লিন াসি
NEGATIVE IMPACT
লশশু পণিগ্রালফ
মাদনকর প্রসার িারী ও লশশু পাচার
শারীলরক গঠি ও মািলসক লবকানস অপলরপক্কিা
উগ্রবাদী মনিা াব ও গাঁজব
মািহালি ও মািহালিকর িথয প্রচার
IMPACT OF INTERNET
Addiction
IMPACT OF INTERNET
Personality
IMPACT OF INTERNET
িথয প্রালি ও সংরক্ষণ
POSITIVE IMPACT
ফযাগানযাগ
অিিাইি লশক্ষা
অিিাইি বযাবসা বালণনজযর প্রসার
অিিাইনি লচলকৎসা ফসবা
লশশু লশক্ষা ও লবনিাদি
SOCIAL ENGINEERING ATTACKS
Deepfake is an artificial intelligence-based human image
synthesis technique
• Mobile phones were used.
DIGITAL FORENSICs & INVESTIGATIONS
Forensics is the application of science to solve a
legal problem
Digital Forensics is a part of forensic science (in
relation to computer crime) focusing on the
recovery and investigation of material (essentially
data) found in digital devices.
In a word, It is recovery Science
DELETED FILES
LOGS
SPECIAL SYSTEM FILES (REGISTRY ETC.)
EMAIL ARCHVES, PRINTER SPOOLS
ADMINIRTRATIVE SETTING
INTERNET HISTORY
CHAT ARCHIVES
ENCRYPTED FIELS /PASSWORD PROTECTED
FILES
A talented young boy
of 14/15 years who was
studying late went out
of the house to take
the exam and left his
bag and notebook in a
nearby shop and
disappeared.
The boy's parents filed
a complaint with the
law enforcement
agencies.
ATTACKS
Deleted SMS recovery by forensics
General Forensic Investigations
JTAG Forensic Investigations
CHIP-OFF Forensic Investigations
GPS INVESTIGATION
https://myactivity.google.com/more-activity
GPS INVESTIGATION
GPS INVESTIGATION
https://www.google.com/maps/timeline?pb=!1m2!1m1!1s2018-06-22
ARTIFICIAL INTELLIGENCE
ChatGPT
ChatSonic
Bard
CoPilot
The New Bing (Bing AI)
Character Certificate
Statement of Certificate
40%
10%
2%
8%
10%
12%
2% 3%
8%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
Character Chart
2019
This is to certify that
RAHIM son/daughter
of…YYYY…………is well
known to FACEBOOK
Ind. Since last
…2011….years and…..
month. To the best of our
knowledge and belief he/she
bearing following character.
Note : Pother pacali, রঙ্গমঞ্চ, গরুঠাকুর megh-Balika also known as Rahim that’s fake ID
ANTI FORENSICS
Anti forensics (sometimes counter
forensics) is a general term for a set
of techniques used as
countermeasures to forensic analysis.
DELETED FILES
LOGS
SPECIAL SYSTEM FILES (REGISTRY ETC.)
PASSWORD CHANGING POLICY.
DON’T USE SIMPLE PASSWORD. (APNI123, 123456, 098765, 0171300056,
APNI00056)
DON’T CLICK ON UN TRUSTED LINK.
SPOOFING EMAIL (LOTTERY, GIRLFRIEND/BOYFRIEND, JOB)
REMOVE UNKNOWN FRIEND SOCIAL MEDIA.
USE STRONG PASSWORD.
DO NOT GIVE YOUR DEVICE TO UN TRUSTED PEOPLE.
.
https://facebook.com/mehedi0001
+880-1973000056
Be with
someone who
will warning
you about
cyber attack

Mais conteúdo relacionado

Semelhante a ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES

unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
Srinivas Kanakala
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
Felipe Prado
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
TanviModi14
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Avinash Rajput
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
CUInnovationTeam
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
Iaetsd Iaetsd
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
CA.Kolluru Narayanarao
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
Binu p jayan
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
ijtsrd
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Takeshi Takahashi
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 

Semelhante a ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES (20)

unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 

Mais de Mehedi Hasan

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
Mehedi Hasan
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
Mehedi Hasan
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
Mehedi Hasan
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Mehedi Hasan
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
Mehedi Hasan
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
Mehedi Hasan
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdf
Mehedi Hasan
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
Mehedi Hasan
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
Mehedi Hasan
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
Mehedi Hasan
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Mehedi Hasan
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
Mehedi Hasan
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
Mehedi Hasan
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
Mehedi Hasan
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation training
Mehedi Hasan
 
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
Mehedi Hasan
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)
Mehedi Hasan
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
Mehedi Hasan
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 

Mais de Mehedi Hasan (20)

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdf
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation training
 
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 

Último

Understanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It MattersUnderstanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It Matters
AstroForYou
 
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report –  What the Certified Fraud Examiner Should KnowThe Fraud Examiner’s Report –  What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
DOJO Training room | Training DOJO PPT
DOJO Training room | Training DOJO   PPTDOJO Training room | Training DOJO   PPT
DOJO Training room | Training DOJO PPT
Himanshu
 
Exceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in MelbourneExceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in Melbourne
Outdoor Home Decor Company
 
Best Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA StudiesBest Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA Studies
SAGA Studies
 
Material Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdfMaterial Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdf
sandeepmetsuae
 
Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.
Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.
Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.
betterworlds2012
 
antivirus and security software | basics
antivirus and security software | basicsantivirus and security software | basics
antivirus and security software | basics
basicsprotection
 
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
usaisofficial
 
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
Alexa Bale
 
Solar powered Security Camera- Sun In One
Solar powered Security Camera- Sun In OneSolar powered Security Camera- Sun In One
Solar powered Security Camera- Sun In One
John McHale
 
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptxTop 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
e-Definers Technology
 
Top 10 Proven Ways for Optimizing a WordPress Website for SEO.pptx
Top 10 Proven Ways for Optimizing a WordPress Website for SEO.pptxTop 10 Proven Ways for Optimizing a WordPress Website for SEO.pptx
Top 10 Proven Ways for Optimizing a WordPress Website for SEO.pptx
e-Definers Technology
 
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptxTop Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Merchantech - Payment Processing Services
 
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptxBiomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
ECOSTAN Biofuel Pvt Ltd
 
Material Testing Lab Services in Dubai.pptx
Material Testing Lab Services in Dubai.pptxMaterial Testing Lab Services in Dubai.pptx
Material Testing Lab Services in Dubai.pptx
sandeepmetsuae
 
Bilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital MarketingBilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar
 
Siddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TXSiddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TX
gaurisiddhivinayakte
 
Enhance Your Home with Professional Painting Services
Enhance Your Home with Professional Painting ServicesEnhance Your Home with Professional Painting Services
Enhance Your Home with Professional Painting Services
Perfect Industrial
 
Electrical Testing Lab Services in Dubai.pptx
Electrical Testing Lab Services in Dubai.pptxElectrical Testing Lab Services in Dubai.pptx
Electrical Testing Lab Services in Dubai.pptx
sandeepmetsuae
 

Último (20)

Understanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It MattersUnderstanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It Matters
 
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report –  What the Certified Fraud Examiner Should KnowThe Fraud Examiner’s Report –  What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
 
DOJO Training room | Training DOJO PPT
DOJO Training room | Training DOJO   PPTDOJO Training room | Training DOJO   PPT
DOJO Training room | Training DOJO PPT
 
Exceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in MelbourneExceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in Melbourne
 
Best Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA StudiesBest Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA Studies
 
Material Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdfMaterial Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdf
 
Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.
Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.
Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.
 
antivirus and security software | basics
antivirus and security software | basicsantivirus and security software | basics
antivirus and security software | basics
 
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
 
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
 
Solar powered Security Camera- Sun In One
Solar powered Security Camera- Sun In OneSolar powered Security Camera- Sun In One
Solar powered Security Camera- Sun In One
 
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptxTop 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
 
Top 10 Proven Ways for Optimizing a WordPress Website for SEO.pptx
Top 10 Proven Ways for Optimizing a WordPress Website for SEO.pptxTop 10 Proven Ways for Optimizing a WordPress Website for SEO.pptx
Top 10 Proven Ways for Optimizing a WordPress Website for SEO.pptx
 
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptxTop Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
 
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptxBiomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
 
Material Testing Lab Services in Dubai.pptx
Material Testing Lab Services in Dubai.pptxMaterial Testing Lab Services in Dubai.pptx
Material Testing Lab Services in Dubai.pptx
 
Bilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital MarketingBilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital Marketing
 
Siddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TXSiddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TX
 
Enhance Your Home with Professional Painting Services
Enhance Your Home with Professional Painting ServicesEnhance Your Home with Professional Painting Services
Enhance Your Home with Professional Painting Services
 
Electrical Testing Lab Services in Dubai.pptx
Electrical Testing Lab Services in Dubai.pptxElectrical Testing Lab Services in Dubai.pptx
Electrical Testing Lab Services in Dubai.pptx
 

ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES