https://cybersecurityindiamiraroad.blogspot.com/2022/05/what-is-drone-hacking.html
https://cybersecurityindiamiraroad.blogspot.com/2022/05/what-is-phone-jammer.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/what-is-hacking-through-social.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/what-is-hacking-through-social.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/what-you-will-learn-in-cyber-security.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/list-of-certification-in-cyber-security.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/career-in-cyber-forencis.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/bvoc-in-cyber-crime.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/what-is-cyber-attack.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/what-is-meant-by-cyber-insurance.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/career-in-cyber-audit.html
[1:58 pm, 16/06/2022] careertechnologymiraroad: https://cybersecurityindiamiraroad.blogspot.com/2022/06/va-pt-as-best-cyber-security-career.html
[1:58 pm, 16/06/2022] careertechnologymiraroad:
https://cybersecurityindiamiraroad.blogspot.com/2022/06/hacking-through-printer.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/va-pt-of-idsips.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/va-pt-of-idsips.html
https://idcit.blogspot.com/2022/06/va-pt-of-idsips.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/spring-shell-attack.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/hacking-through-cookies.html
https://cybersecurityindiamiraroad.blogspot.com/2022/06/data-breach-attack.html
https://cybersecurityindiamiraroad.blogspot.com/2022/07/career-in-digital-forencis.html
Blog On Career In Digital Forencis
https://cybersecurityindiamiraroad.blogspot.com/2022/07/hard-disk-cloning.html
Hard disk cloning
https://1drv.ms/b/s!ApVaQavO8wqcggQo0FBP6gpDGdOm?e=F4XWtc
C.P.C (Code of Civil Procedure)
https://1drv.ms/b/s!ApVaQavO8wqcggWnqOTUpgCs38mu?e=R0UTI7
Evidence Act
https://1drv.ms/b/s!ApVaQavO8wqcggbGWpueJmM3zvfI?e=NsdDs6
Constitutional Law
https://1drv.ms/b/s!ApVaQavO8wqcggctBm4BngQpcP1h?e=pzctWX
I.P.C (Indian Penal Code)
https://1drv.ms/b/s!ApVaQavO8wqcgghLkUGD3yHZJmEP?e=KXgD3R
https://1drv.ms/b/s!ApVaQavO8wqcggmDqcjSjT_GTqac?e=76vjml
Alternative Dispute Redressal including Arbitration Act
https://1drv.ms/b/s!ApVaQavO8wqcggrTcdXOx4mdVfCb?e=M8hncJ
LB- 105 Family Law
https://1drv.ms/b/s!ApVaQavO8wqcggsQeFPQ_nz7J50X?e=wweLzh
Public Interest Litigation
https://1drv.ms/b/s!ApVaQavO8wqcggzA9XsyBNNTBuHz?e=1rO9qb
Administrative-Law
https://1drv.ms/b/s!ApVaQavO8wqcgg3-LNPC4UVHeND8?e=mkg2o9
Company Law
https://1drv.ms/b/s!ApVaQavO8wqcgg5XP8YVO1RnxpeX?e=TCEwaI
Environmental Law
https://1drv.ms/b/s!ApVaQavO8wqcgg_URRcorHEak6DG?e=BK0Tvv
cyber law
https://1drv.ms/b/s!ApVaQavO8wqcghDnTKI5yfpbVtl-?e=FAnD5p
IndustrialLabour&GeneralLaws
https://1drv.ms/b/s!ApVaQavO8wqcghH1t6L0W5iOBoux?e=IvEBbf
Law of Tort, including Motor Vehicle Act and Consumer Protection Law
https://1drv.ms/b/s!ApVaQavO8wqcghKxyIqkrN1FgBM2?e=a5vu3E
Law related to Taxation
https://1drv.ms/b/s!ApVaQavO8wqcghOOcnfPp7sy84gX?e=c5EHhJ
NEGOTIABLE INSTRUMENTS ACT
https://1drv.ms/b/s!ApVaQavO8wqcghTo1AD7Yt5nw4bK?e=7NetJM
Specific Relief Act 1963-47
https://1drv.ms/b/s!ApVaQavO8wqcghX1ekqnQTzRhC7-?e=cvJ6uR
THE LAND ACQUISITION ACT
https://1drv.ms/b/s!ApVaQavO8wqcggJ1BklqD3JTATqs
Intellectual Property Laws
https://1drv.ms/b/s!ApVaQavO8wqcgghLkUGD3yHZJmEP?e=KXgD3R
Cr.P.C (Criminal Procedure Code)
https://1drv.ms/b/s!AtGeCh0z8m8RgQNR9EzKY4t255jn?e=JRTgEj Regulate
E commerce .
https://1drv.ms/b/s!AtGeCh0z8m8RgQzaw6HqBNeD6aFe?e=HCe3qO 109
NOTES EVIDENCE OLD
https://1drv.ms/b/s!AtGeCh0z8m8RgQ2vV03UsgjyHhQD?e=nmnDjy
Evidence New ACT
https://1drv.ms/b/s!AtGeCh0z8m8RgRAKvA_B_exhlXsK?e=FcRRQo
Information Technology Act 2000 to 2008
https://1drv.ms/b/s!AtGeCh0z8m8RgQ-n5OrpuZXlbW0I?e=6jTHIP
IT guidelines and Digital Media Ethics code Rules 2021
https://1drv.ms/b/s!AtGeCh0z8m8RgSP-d_MV94Wc2bm0?e=K2NI3p CYBER LAW OF INDIA
https://cybersecurityindiamiraroad.blogspot.com/2022/09/what-is-darknet.html
What is DarkNet?
https://cybersecurityindiamiraroad.blogspot.com/2022/09/what-is-prodiscover-forensics.html What is prodiscover?
https://cybersecurityindiamiraroad.blogspot.com/2022/09/what-is-prodiscover-forensics.html What is prodiscover?
https://cybersecurityindiamiraroad.blogspot.com/2022/09/caine.html New blog on CAINE
https://cybersecurityindiamiraroad.blogspot.com/2022/09/paladin.html
PALADIN
https://cybersecurityindiamiraroad.blogspot.com/2022/09/what-is-encase.html
ENCASE
https://cybersecurityindiamiraroad.blogspot.com/2022/09/sift-workstation.html SIFT WORKSTATION
https://cybersecurityindiamiraroad.blogspot.com/2022/09/ftk-imager.html FTK IMAGER
https://cybersecurityindiamiraroad.blogspot.com/2022/09/magnet-ram-capture.html MAGNET RAM CAPTURE
https://cybersecurityindiamiraroad.blogspot.com/2022/09/x-ways-forensics.html X-WAYS FORENSIC
https://cybersecurityindiamiraroad.blogspot.com/2022/09/wireshark.html
Wire SHARK
https://cybersecurityindiamiraroad.blogspot.com/2022/09/registry-recon.html REGISTRY RECON
https://cybersecurityindiamiraroad.blogspot.com/2022/09/volatility-framework.html VOLATILITY FRAMEWORK
https://cybersecurityindiamiraroad.blogspot.com/2022/09/xplico.html XPLICO
https://cybersecurityindiamiraroad.blogspot.com/2022/09/nmap.html NMAP
https://cybersecurityindiamiraroad.blogspot.com/2022/09/oxygen-forensic-suite.html OXYGEN FORENSIC SUITE
https://cybersecurityindiamiraroad.blogspot.com/2022/09/the-sleuth-kit.html SLEUTHKIT
https://cybersecurityindiamiraroad.blogspot.com/2022/09/free-hex-editor-neo.html HEX EDITOR NEO
https://cybersecurityindiamiraroad.blogspot.com/2022/09/mobile-verification-toolkit-mvt.html MOBILE VERIFICATION TOOLKIT
https://cybersecurityindiamiraroad.blogspot.com/2022/09/forensics-acquisition-of-websites-faw.html FORENSIC acquisition-of-websites-faw.
https://cybersecurityindiamiraroad.blogspot.com/2022/09/usb-write-blocker.html USB WRITE BLOCKER
https://cybersecurityindiamiraroad.blogspot.com/2022/09/exiftool.html EXIFTOOL
https://cybersecurityindiamiraroad.blogspot.com/2022/10/memhunter-automated-memory-resident.html
Memhunter-
Automated Memory Resident Malware Detection
https://cybersecurityindiamiraroad.blogspot.com/2022/10/grr-rapid-response-is-incident-response.html
GRR Rapid Response is an incident response
https://cybersecurityindiamiraroad.blogspot.com/2022/10/fastir-collector-windows-incident.html
FastIR Collector – Windows Incident Response Tool
https://cybersecurityindiamiraroad.blogspot.com/2022/10/rekall-memory-forensic-framework.html
Rekall – Memory Forensic Framework
https://cybersecurityindiamiraroad.blogspot.com/2022/11/sysdig-linux-system-troubleshooting-tool.html
Sysdig – Linux System Troubleshooting Tool
https://cybersecurityindiamiraroad.blogspot.com/2022/11/the-cryptographic-implementations.html
Cryptographic Implementations Analysis Toolkit
https://cybersecurityindiamiraroad.blogspot.com/2022/11/rec-studio-4-reverse-engineering.html
Rec Studio 4 – Reverse Engineering Compiler & Decompiler
https://cybersecurityindiamiraroad.blogspot.com/2022/11/file-disclosure-browser-tool-to-explore.html
File Disclosure Browser – Tool To Explore .DS_Store Files
https://cybersecurityindiamiraroad.blogspot.com/2022/11/networkminer-v11-released-windows.html
NetworkMiner v1.1 Released – Windows Packet Analyzer & Sniffer
https://cybersecurityindiamiraroad.blogspot.com/2022/11/collar-bomber-gets-owned-by-word.html
Collar Bomber Gets Owned By Word Metadata & USB Drive
https://cybersecurityindiamiraroad.blogspot.com/2022/11/sniffjoke-041-released-anti-sniffing.html
Sniffjoke 0.4.1 Released – Anti-sniffing Framework & Tool For Session Scrambling
https://cybersecurityindiamiraroad.blogspot.com/2022/11/malware-analyser-v30-static-dynamic.html
Malware Analyser v3.0 – A Static & Dynamic Malware Analysis Tool
https://cybersecurityindiamiraroad.blogspot.com/2022/11/peepdf-analyze-modify-pdf-files.html
peepdf – Analyze & Modify PDF Files
https://cybersecurityindiamiraroad.blogspot.com/2022/11/katana-v2-y0jimb0-portable-multi-boot.html
Katana v2 (y0jimb0) – Portable Multi-Boot Security Suite
https://cybersecurityindiamiraroad.blogspot.com/2022/11/tcpxtract-extract-files-from-network.html
Tcpxtract – Extract Files from Network Traffic AKA Carving