Cyber News April 2024 || Duvel Beer || Indian RAW & I4C || CISCO || Change Health Care || Phone Tap

แชร์
ฝัง
  • เผยแพร่เมื่อ 13 ธ.ค. 2024

ความคิดเห็น • 179

  • @jaswanthroyal3268
    @jaswanthroyal3268 7 หลายเดือนก่อน +36

    Full explanation on block chain regarding how it is benefits cyber security and how crypto can be lost or stolen.

    • @VasuYT1
      @VasuYT1 6 หลายเดือนก่อน

      Blockchain tech doesn’t benefit Cyber Security. It’s another revolutionary tech in terms of mainly sending money peer to peer without involvement of govt or any third party entity.

    • @jaswanthroyal3268
      @jaswanthroyal3268 6 หลายเดือนก่อน

      @@VasuYT1 it's just a technology, governments can also use this technology, with all due respect, I just how block chain can help cybersecurity, sir has lot of experience in cybersecurity space, so I assumed he may provide some valuable content.

    • @DarkBoyEdits9989
      @DarkBoyEdits9989 6 หลายเดือนก่อน

      ​@@VasuYT1lot of companies or projects due to vulnerabilites in web3.0...

    • @jagadeeshch7870
      @jagadeeshch7870 5 หลายเดือนก่อน

      @@VasuYT1 Maybe you are wrong. Blockchain can be used for other things as well. For example, we can store people's property documents in multiple blocks managed by the government without involving a third party. If anyone hacks these documents by stealing a key, it will alert the respective party and other blocks. There is still a chance of hacking, but it will be very small.

    • @jagadeeshch7870
      @jagadeeshch7870 5 หลายเดือนก่อน

      @@jaswanthroyal3268 Blockchain can be used for other things as well. For example, we can store people's property documents in multiple blocks managed by the government without involving a third party. If anyone hacks these documents by stealing a key, it will alert the respective party and other blocks. There is still a chance of hacking, but it will be very small.

  • @vishnushivarejectedpeace9488
    @vishnushivarejectedpeace9488 6 หลายเดือนก่อน +6

    Real hacker ni theeskocchi oka podcast cheyyandi mastaruu...

  • @davidsunnykondru1754
    @davidsunnykondru1754 7 หลายเดือนก่อน +12

    Sir,
    Topic-1 if there is a Country which is under cyber attack, and every critical infrastructure is affected, how would the public and private sectors act and what kind of policies would be invoked and would there be any disaster management plan or do we have disaster management preparedness.
    Topic-2: Are there any cybersecurity summits that happen in our country and competitions not only hacking in other security related areas.

  • @nagak6489
    @nagak6489 7 หลายเดือนก่อน +9

    kudos for the efforts Murali mastaru , I am into cyber security and I can relate to the all the cases that you guys are discussing

    • @ShowTime31158
      @ShowTime31158 7 หลายเดือนก่อน +1

      Avunaa bro!! Ye domain lo work chesthunnaaru?

  • @SRaviKiranM
    @SRaviKiranM 7 หลายเดือนก่อน +9

    Murali Sir #Pegasus (spyware) if you could do a small episode on this, please ?

  • @jagadeesh_damarasingu
    @jagadeesh_damarasingu 7 หลายเดือนก่อน +7

    Block chain + Elections
    Blockchain + Donations sites (for transparency of funds)(ketto campaigning fraud during COVID)
    India's own Blockchain network ?

  • @JaganmohanK-Ind-De
    @JaganmohanK-Ind-De 7 หลายเดือนก่อน +1

    Industrial automation or IOT systems are going towards edge computing where we no need to send the sensitive data to cloud do the data processing in edge devices like microcontrollers. Cloud data ni ela hack chestaaru anedi chepte baaguntundi because IOT and Machine learning vast ga use chestunnaru so students or techies ki idi baga use avtadi info.

  • @manatom
    @manatom 6 หลายเดือนก่อน +1

    i really like how you are explaining things.

  • @loki7265
    @loki7265 6 หลายเดือนก่อน

    This is the content, which could understand people after 15 years ...

  • @Vamsi_564
    @Vamsi_564 7 หลายเดือนก่อน +1

    Nice daily make one video like this to cover all hacking news please sir..

  • @sreekrishna8582
    @sreekrishna8582 6 หลายเดือนก่อน +1

    Awesome and interesting content! Can you please cover the Cyberattack of Maersk which happened in 2018 in the future episodes?
    It will be a great learning with do and don’t for all.

  • @jackeysharath7077
    @jackeysharath7077 7 หลายเดือนก่อน +1

    That was a nice pod cast. Please suggest a few technologies that the upcoming students need to learn in this AI world. Also suggest the technology application with real world examples.

  • @krisayo
    @krisayo 7 หลายเดือนก่อน

    Your experience is useful for movie writers

  • @jaruknath6114
    @jaruknath6114 6 หลายเดือนก่อน

    I used work on OSS configurations for a huge telecommunication company in US. Microwave is bloody complex configuration to do.

  • @Eamledu
    @Eamledu 7 หลายเดือนก่อน +3

    Duvel case: IT SYSTEMS shutdown chesi format cheytam vala asalu ealaa attack jarigindi ani investigation ealaa chestaaru?

    • @kumarshk3071
      @kumarshk3071 6 หลายเดือนก่อน +1

      Shutdown ante... for outside world and isolated them to only their access

  • @santoshkumar-sm5ec
    @santoshkumar-sm5ec 7 หลายเดือนก่อน +1

    Topics and solutions needed
    1. Thousands of Indian mobile SIMS going to Vietnam, reason?
    2. Where could be Pegasus software now which brought by earlier govts in AP. Is that single person able to handle today tool.
    3. If I lost phone, with find my device active, still not found.. what are worst case scenarios and solutions.
    4. Gold and drug busts in airports and ports
    5. Deep fake what's app call to request money as friend or family.
    6. Naked vedios blackmail solutions.
    7. How hard or easy an EVM to hack.
    8. How easy an normal router wifi to hack, safety tips.
    9. Hackers competetions in other nations including neighbours, record level 7 seconds to hack iPhone? Possible?
    10. What if a money heist kind of scenarios in India, how well established our depts are! who and how they handle!!!

    • @MuraliMastaru
      @MuraliMastaru  7 หลายเดือนก่อน

      This a lot of home work - OMG

  • @hrushispace
    @hrushispace 7 หลายเดือนก่อน +1

    Explain about " XZ & jia tan " backdoor

  • @nagamurali364
    @nagamurali364 5 หลายเดือนก่อน

    Murali sir tell about your self means where are you from and what's your roots ఎందుకంటే మీరు ఇంగ్లీష్ ఎలా matlaaduthunnaroo తెలుగు కూడా కచ్చితంగా ఎలా maatlaaduthunnaru సిర్.......

  • @SandeepS-i3d
    @SandeepS-i3d 6 หลายเดือนก่อน

    NFC hacking gurinchi video cheyandi sir..

  • @vaibhavchaturvedi7824
    @vaibhavchaturvedi7824 6 หลายเดือนก่อน

    The pegasus should be covered as it made a lot of chaos in India. How israel compiled software had waves in India, who was responsible ? What was the impact? What were the mitigation steps taken? How it was the shutdown?

  • @Sudheer8723
    @Sudheer8723 6 หลายเดือนก่อน

    Solarwinds attack and Log4j explain these!!

  • @saikirannalubola3981
    @saikirannalubola3981 7 หลายเดือนก่อน

    Nice Information mastaru 😊

  • @sampath1285
    @sampath1285 6 หลายเดือนก่อน

    Please please please make a full proof video on Pegasus spyware. Please....

  • @thummalatulasi
    @thummalatulasi 6 หลายเดือนก่อน

    Explain about most recent cyber cases in india and how in future the attacks will be there.. Thank you masteruu

  • @dasarisivadarling
    @dasarisivadarling 6 หลายเดือนก่อน

    Waiting for hacker episode 🔥🔥🔥🔥🔥

  • @malladirajesh8367
    @malladirajesh8367 6 หลายเดือนก่อน

    Pithapuram election is reging pls investigation ...?

  • @ShowTime31158
    @ShowTime31158 7 หลายเดือนก่อน

    Guriji....please check my preferences below:-
    1. State sponsored hacking groups
    2. APTs

  • @sriram-nv5hq
    @sriram-nv5hq 7 หลายเดือนก่อน

    We need some Worlds top 3 mostly interesting hacks and how they catch

  • @reva6756
    @reva6756 5 หลายเดือนก่อน

    Zero day attack is a vulnerability can’t be find by developers who develop software

  • @livebughunting9393
    @livebughunting9393 6 หลายเดือนก่อน

    Nenu ap gov website loo vulnerability find chesi .. lopala data motham .. edit and manage chesey antha vulnerability... But mana gov not responding 😂😂

  • @karthikeyankumbam9906
    @karthikeyankumbam9906 7 หลายเดือนก่อน +1

    I saw all of your videos. Thanks for sharing the knowledge. Why the call recording has disabled in new mobile phones. Pls can u tell the reason for it

  • @gnanatejserla6388
    @gnanatejserla6388 7 หลายเดือนก่อน +4

    Why not UPI is hackable?
    Total India using it.
    Is it dangerous in future that we can loos the money?
    Now money is just number in digital!!!

  • @Vamshi_hras
    @Vamshi_hras 7 หลายเดือนก่อน +1

    Please tell us about Pegasus spyware …

  • @nagamurali364
    @nagamurali364 5 หลายเดือนก่อน

    ట్రెయిన్ signal trap చేదానికి వీలు ఉంటుందా ఈ మధ్యన జరిగిన ట్రెయిన్ ఏక్సిడెంట్ బాస్ చేసుకుని చెప్పండి......

  • @cvkrishna86
    @cvkrishna86 7 หลายเดือนก่อน

    Today we have faced one only fraud they have taken mobile access and looted 2 lakhs. Really this online fraud is horrible, small mistake (negligence) costed huge loss

  • @mohanganeshmunagala9423
    @mohanganeshmunagala9423 7 หลายเดือนก่อน

    Mi experience share cheyyandi anna ela decode chestaru oka problem ni avi chalu🎉

  • @Yesh_9
    @Yesh_9 6 หลายเดือนก่อน

    I want know about how AI going to impact the cyber world.

  • @BhanuPrakash-rq5qs
    @BhanuPrakash-rq5qs 6 หลายเดือนก่อน

    Sir do a video about Dell finance app

  • @shivaakumar5998
    @shivaakumar5998 6 หลายเดือนก่อน

    Dear sir can you please explain about Israel technology and how they will caught criminals .. how many types of methods they will use .. please explain. If u do episode on this I think this is gonna be a viral and good video

  • @salinis5078
    @salinis5078 7 หลายเดือนก่อน

    Please do a video on bitcoin. What is it? How it works? Why hackers use bitcoins for ransomware payments

  • @srikanthnareddy6804
    @srikanthnareddy6804 7 หลายเดือนก่อน

    Hello sir , please guide or provide a road map for students who are studying cyber security covering how they become a great cyber security expert

  • @lalithsurya1630
    @lalithsurya1630 6 หลายเดือนก่อน

    How is crypto and blockchain related to cybersecurity

  • @Tinku-jn5rn
    @Tinku-jn5rn 7 หลายเดือนก่อน +1

    Mahesh cooperative bank robbery case study cheppandi sir and a bank vallu proper IDS/IPS systems setup chyaledhu and vallu oka chinna company tho software chepincharu. so okasari a case meru study chesi maku okasari explain chyandi sir.

    • @Vamsi_564
      @Vamsi_564 7 หลายเดือนก่อน

      Hi bro em work chestavu nu

    • @MuraliMastaru
      @MuraliMastaru  7 หลายเดือนก่อน

      Please Google me

  • @HappyJobs-o8h
    @HappyJobs-o8h 7 หลายเดือนก่อน +1

    Please consider sharing your views on - Stock markets, share price manipulation and gambling chances by big players.. finally, how to crack that in practice.

    • @MuraliMastaru
      @MuraliMastaru  7 หลายเดือนก่อน +1

      I am not a expert on these topics - hence will not comment. But we can bring in an expert.

    • @HappyJobs-o8h
      @HappyJobs-o8h 7 หลายเดือนก่อน

      @@MuraliMastaru thank you for responding ❤️

  • @majjiveerendra1291
    @majjiveerendra1291 7 หลายเดือนก่อน

    Hi bro, cryptos n stocks fraud gurinchi chepandi

  • @pramodsaiteja3153
    @pramodsaiteja3153 6 หลายเดือนก่อน +1

    Mastaru garu...
    I have a common query, like when police arrest some one assuming they made a crime and due to circumstances police kill them( in the name of......) if such things happen how a common man(victim family members) has to react to know the truth. Could you please give glimpse info on this which is very common scenario we are seeing now a days.

    • @MuraliMastaru
      @MuraliMastaru  6 หลายเดือนก่อน

      Pramod - I am not a criminal lawyer, but still my response as common man is the concerned personnel will depict will resort to these kind of behaviour when they fail to investigate the case, in any case the stance of courts have turned to be very strict and they impose serious punishment to erring officers more often than not.

    • @jaruknath6114
      @jaruknath6114 6 หลายเดือนก่อน

      I could immediately think of a name which starts with Initials of South Africa followed by double J and an Or !!

  • @NSKPOWER
    @NSKPOWER 6 หลายเดือนก่อน

    Edho podichedham Ani ...oka betting app lo aadhar. PAN card front back photos tho sahaa details echesaaa....
    Eppudu nenu em chesthe future lo veeti valla problem raakundaa untaadho chepthaaraa please....

  • @rockeyharshan5781
    @rockeyharshan5781 7 หลายเดือนก่อน

    Stock market kii SEBI vundi kadhaa mari crypto currency kii regulations who evaruuu

  • @pavankumar9540
    @pavankumar9540 6 หลายเดือนก่อน

    Good education

  • @RaghuRamPillamarapu
    @RaghuRamPillamarapu 6 หลายเดือนก่อน

    What is computer networking how it works

  • @boyaraghavendra
    @boyaraghavendra 7 หลายเดือนก่อน

    Viewers will be very happy if you explain Bangladesh Central Bank hacking case. Where some transactions are stopped by SWIFT payment network fortunately...

    • @MuraliMastaru
      @MuraliMastaru  7 หลายเดือนก่อน

      This is good one to discuss - let me do a short on this.

  • @MadhuSudhan-sy4eu
    @MadhuSudhan-sy4eu 7 หลายเดือนก่อน

    Frequently VMware systems are getting malware attacks. We know this company is big cloud and part of broadcom now. Can you explain about this.

  • @vamshimarikanti1470
    @vamshimarikanti1470 7 หลายเดือนก่อน

    Ts phone tapping and Pegasus gurinchi discuss cheyandi

    • @MuraliMastaru
      @MuraliMastaru  7 หลายเดือนก่อน

      Phone Tapping is coming very soon....

  • @anthonyreddy8523
    @anthonyreddy8523 7 หลายเดือนก่อน

    How a decentralised, distributed and immutable systems can be useful for safe keeping of records and expose those records if necessary

  • @Mahi-hk6dg
    @Mahi-hk6dg 7 หลายเดือนก่อน

    Boat company customer data hack aindhi kadha, konchem detailed review ivvandi sir.

  • @getrags555
    @getrags555 6 หลายเดือนก่อน

    Can you plz elaborate on mobile consents which we give for multiple apps such as cred, Truecaller and Google. What access do these applications have , I doubt they are listening to all our conversations and come up with add suggestions.

  • @shivakissnad9741
    @shivakissnad9741 7 หลายเดือนก่อน

    I have one doubt, this is friction on movies but many science and adventure movies they are saying we have all access for every CCTV AND every government portal how is this possible this only for making that situation or its true?

  • @MrSrikanth00795
    @MrSrikanth00795 7 หลายเดือนก่อน

    Superb sir. Ty for the info

  • @murapakasrinivasarao544
    @murapakasrinivasarao544 7 หลายเดือนก่อน +1

    security gaa eelaa ?

  • @ManiTejaJ
    @ManiTejaJ 6 หลายเดือนก่อน

    Is indian rupee coming with block chain technology like bitcoin way buy/sell

  • @muralikrishna5314
    @muralikrishna5314 7 หลายเดือนก่อน

    Please change the shirt colour of host

  • @saikarun
    @saikarun 6 หลายเดือนก่อน

    can you make a detailed video on Mahesh Bank fraud Hyderabad branch

  • @HariKrishna-l9m
    @HariKrishna-l9m 7 หลายเดือนก่อน

    Please make a video on cyber security detailed roadmap for freshers

    • @ShowTime31158
      @ShowTime31158 7 หลายเดือนก่อน

      Already done

    • @ShowTime31158
      @ShowTime31158 7 หลายเดือนก่อน

      Already done...check videos

    • @HariKrishna-l9m
      @HariKrishna-l9m 7 หลายเดือนก่อน

      @@ShowTime31158 yes I have already gone through that video but if he eloborate road map it would be more helpful

  • @sairamnandigam5525
    @sairamnandigam5525 7 หลายเดือนก่อน

    We able to send alert notification along with required action to take with the help of automation using Ansible and other tools😅🔥

    • @krish88-qm8tl
      @krish88-qm8tl 5 หลายเดือนก่อน

      What kind of software are you using to send notifications if there is hack or ddos attack ? Ansible can’t send alerts for sure…

  • @bodapatlavamshi1688
    @bodapatlavamshi1688 7 หลายเดือนก่อน

    Sir we need cyber sequrity course from from murali sir because he had lot of experience in this field we don't know the root map how it goes and it is also very expensive in the market so we could request to guide the people who are interesting in the cyber sequrity plz plz plz plzzz think about it sir I m full of respect uh sir plz give me a details to I earn course with u personally with any cost kindly kindly kindly think about these sir

  • @HOURS_OF_INTERNET
    @HOURS_OF_INTERNET 6 หลายเดือนก่อน

    News related to anonymous

  • @vikranthreddy7736
    @vikranthreddy7736 7 หลายเดือนก่อน

    Very informative

  • @PastorMadhu-i5o
    @PastorMadhu-i5o 7 หลายเดือนก่อน

    Sir would you please EXPLAIN HOW TO PROTECT MY SELF FROM CYBER CRIMES ( MONEY MATTERS)

    • @Whackfuck
      @Whackfuck 7 หลายเดือนก่อน

      Don’t fall for honey traps and don’t click on any links. Don’t give your personally identifiable info, cards details etc. phone number is very key for your life, your bank, aadhar, pan, ITR etc links to your phone if it’s gone your life will turn upside down.

  • @saicharankonyala7891
    @saicharankonyala7891 7 หลายเดือนก่อน

    can you talk about snowden movie

  • @Ganeshreddysatti
    @Ganeshreddysatti 7 หลายเดือนก่อน

    Sir, present wfh lo banking system like KYC completely license, personal photo passport, visa, address, phone number, address ani ee wfh Lappy lo unayi and also balance in card is that info easy to steal?

  • @akshaykumarvadla7665
    @akshaykumarvadla7665 7 หลายเดือนก่อน

    what ever the news maybe but please keep doing.

  • @manishtoparam7116
    @manishtoparam7116 6 หลายเดือนก่อน

    Cyber security course nerchukunte bayata market unda

  • @NarasimharaoM1
    @NarasimharaoM1 7 หลายเดือนก่อน

    How can we secure our home wifi connections

  • @ashokraguri9073
    @ashokraguri9073 6 หลายเดือนก่อน

    I want to know about how to work ECIL.....is it possible to manipulate EVM's by chance any party's .....?

    • @MuraliMastaru
      @MuraliMastaru  6 หลายเดือนก่อน +1

      Every lock breaks eventually - but how long is that duration- is what matters - conspiracy theories exist for every topic in the world - you have to make a choice to believing in science or fiction eventually.

  • @nageshvadlamudi5929
    @nageshvadlamudi5929 7 หลายเดือนก่อน

    Murali sir, I want to learn cybersecurity from you..are u providing any coaching by the way..guide us please 🙏

  • @shivasaiprasadbayya8188
    @shivasaiprasadbayya8188 7 หลายเดือนก่อน

    Murali sir tell me about boat data breach and other data breach which are exposing your data and passwords. In my case 3 mouths back i am
    Creating the AWS account while am using Google password to it (your password is breached in dark website try another password) this note is showcased after that i changed my passwords but how they getting this data from Google

  • @phanindrakumar6855
    @phanindrakumar6855 7 หลายเดือนก่อน

    Can you please go through online course scam i.e., Skill lync and some shakes that would reduce body i.e Herbalife

  • @KASARANENIBALAKOTESWARARAO
    @KASARANENIBALAKOTESWARARAO 7 หลายเดือนก่อน

    Hello sir i want to learn cyber security could please suggest one website from basics to advance in cyber security

  • @Mallich999
    @Mallich999 7 หลายเดือนก่อน

    In recent times we have issue with binace(crypto) can you take that case and exolane dep undersatng that ? its realy help !!..

  • @venkatakoushikravuri
    @venkatakoushikravuri 6 หลายเดือนก่อน

    How to enter into cyber field.i am doing engineering and I am desperate to go into cyber field but I have idea how to get in

  • @Hyd_pilla
    @Hyd_pilla 6 หลายเดือนก่อน

    Good... Script readers 📖📖📖

  • @balakarthikpendyala6339
    @balakarthikpendyala6339 6 หลายเดือนก่อน

    Bro I got a job email and interview and everything was done later before releasing offer letter they asked me to submit passport and resume of mine I shared them and later I realized it was a fake job email. I have registered the complaint in cyber crime online. Should I also need to go to police station what could be the resolution for this please suggest me.

  • @pmsagar
    @pmsagar 7 หลายเดือนก่อน

    case 1 AIMS HACK in our country
    case 2 MHA informing in Press conference that on the day of ayodhya temple pran pratista jan22 this year we had 1200 ips blocked reg cyber attack on pls detail teh info

  • @KOTTALIKARTHIK-mg2fz
    @KOTTALIKARTHIK-mg2fz 7 หลายเดือนก่อน

    Sir can u say abt the topic dark web

  • @thirumalasriharsha6636
    @thirumalasriharsha6636 7 หลายเดือนก่อน

    Where can we learn the cyber security ??

  • @stuart_phani
    @stuart_phani 7 หลายเดือนก่อน

    Topic: how Crypto coins mining works and hacking of crypto currency?

  • @durga8950
    @durga8950 7 หลายเดือนก่อน

    Cyber security job resources.if possible course pettandi

  • @snehalatha3206
    @snehalatha3206 6 หลายเดือนก่อน

    Tor and kevin

  • @jotiswarreddyvangala2886
    @jotiswarreddyvangala2886 7 หลายเดือนก่อน

    Love you murali master sir try to make new videos sir

  • @narendranathvaddi9853
    @narendranathvaddi9853 7 หลายเดือนก่อน

    Hi,
    The content is very helpful and knowledgeable,thank you very much for taking this initiative
    My question is
    Our Indian hackers are capable of hacking neighbour country which has different language altogether?
    Is there any such incident earlier happened?

    • @MuraliMastaru
      @MuraliMastaru  7 หลายเดือนก่อน

      The language of Internet is TCP/IP - all packets traverse using that, you are referring to Conte t on the websites, which is not relevant when we want to hack, the attack is on the open vectors on the Applications and OS.

    • @narendranathvaddi9853
      @narendranathvaddi9853 7 หลายเดือนก่อน

      @@MuraliMastaru thanks for your reply
      Some time back I heard Chinese hackers made down our government websites
      It is just speculations or is it really?

  • @SupportStudents-tl7yj
    @SupportStudents-tl7yj 6 หลายเดือนก่อน

    Posting comment in behalf of telugu cyber security aspirants, how the future of manual penetration testing jobs in future. Is it true it is replaces by Ai ?

    • @MuraliMastaru
      @MuraliMastaru  6 หลายเดือนก่อน

      That's a very large generalized comment, remember new software always has unknown pattern of bugs and hence human intelligence will always be needed, but routine/published vulnerabilities may not need humans per se.

  • @uppalanarasimha3641
    @uppalanarasimha3641 7 หลายเดือนก่อน

    Penetration testing complete guide

  • @Bu4364
    @Bu4364 6 หลายเดือนก่อน

    Can we lock hacker details in hardware system using embedded system

    • @MuraliMastaru
      @MuraliMastaru  6 หลายเดือนก่อน

      Can you elaborate?

    • @Bu4364
      @Bu4364 6 หลายเดือนก่อน

      @@MuraliMastaru no sir it's my doubt

  • @vinaykumar-oo7ph
    @vinaykumar-oo7ph 5 หลายเดือนก่อน

    Please suggest some good antivirus software for cyber security

    • @MuraliMastaru
      @MuraliMastaru  5 หลายเดือนก่อน +1

      Microsoft Defender is pretty decent, make sure auto update is on.

    • @heartvinner
      @heartvinner 5 หลายเดือนก่อน

      @@MuraliMastaru thank you

  • @shivaakumar5998
    @shivaakumar5998 6 หลายเดือนก่อน

    No one knows and aware about like pagasus type technology..and how the app will be works ? And how they hack mobiles or laptops … etc. without using links .. how we can protect our mobiles from Pegasus type technologies.. can you give us brief explanation…

  • @sreenum.p.v369
    @sreenum.p.v369 7 หลายเดือนก่อน

    డిటెక్టివ్ నారద sorry detective Murali master

  • @BHRKNK
    @BHRKNK 7 หลายเดือนก่อน

    Why Hackers choose Linux servers more than windows

    • @MuraliMastaru
      @MuraliMastaru  7 หลายเดือนก่อน +1

      Flexibility of Shell (s) , access to tools, access to source code are few factors

  • @saicharanjogu
    @saicharanjogu 6 หลายเดือนก่อน

    Hey murali, wts the the point of keeping subtitles in Telugu, if you are speaking in Telugu, I hope i can see English subtitles back..!!

    • @MuraliMastaru
      @MuraliMastaru  6 หลายเดือนก่อน

      TH-cam is playing tricks with us, we will fix it

  • @T-ni9xb
    @T-ni9xb 7 หลายเดือนก่อน

    Sir try complete English conversation that will definitely help and reach more recipients

  • @mee_rameshnaidu
    @mee_rameshnaidu 7 หลายเดือนก่อน

    Aire Port lo bording pass tho account Hack chayavacha mastaru

    • @MuraliMastaru
      @MuraliMastaru  7 หลายเดือนก่อน

      Airport boarding pass does not have much info beyond the individual/flight/booking I'd that's all