Rahul Pandey | Jawaharlal Nehru Technological University Hyderabad (original) (raw)

Rahul Pandey

I’m a Computer Science and Engineering Graduate With the urge to know more about everything around us, I am skilled in Ethical Hacking ,Penetration Testing and CyberSecurity with keen interest in expanding my knowledge in a bid to be well versed. I am working with Several Cybercrime Awareness communities all over india to Aware people about Cyberfrauds Happening Around us And how to prevent them.

less

Uploads

Papers by Rahul Pandey

Research paper thumbnail of Dark Web -The Hidden Cyberspace

International Association of Scientists & Researchers, 2021

The Dark Web is a small part of the WWW (World Wide Web) whose activities are purposefully covere... more The Dark Web is a small part of the WWW (World Wide Web) whose activities are purposefully covered up and cannot be accessed by normal browsers or search engines and require some particular programs like Tor browser. As the dark web hides the client's identity, it very well may be utilized for legal reasons just as illegal. From sneaking drugs and weapons to other illegal things, from hacking other's data to utilizing those for manufacturing, from duplicating cash to utilizing cryptographic money, the dark web can play various parts in malevolent movements. Then again, the government and other law enforcement agencies utilize the dark web for military applications like online intelligence gathering, sting activity and for other confidential purposes. This paper depicts dark web underlining on how it is accessed, how the tor network works to provide anonymity to its clients, how one can utilize TOR to get to dark web, subtleties on use of dark web for example how unique noxious activities are done utilizing dark web, how the dark web is utilized by terrorist communities to spread terrorism, how the law enforcements are utilizing dark web to reveal some client's real identity and to stop the illegal exercises and the future extent of dark web.

Research paper thumbnail of CYBER INCIDENT RESPONSE Paytm Digital Wallet And Online Transactions Security Measures

Digital 4n6 Journal, 2020

Introduction to Paytm Computer forensics Paytm frauds How it works Security measures Preventive m... more Introduction to Paytm
Computer forensics
Paytm frauds
How it works
Security measures
Preventive measures

Research paper thumbnail of Dark Web -The Hidden Cyberspace

International Association of Scientists & Researchers, 2021

The Dark Web is a small part of the WWW (World Wide Web) whose activities are purposefully covere... more The Dark Web is a small part of the WWW (World Wide Web) whose activities are purposefully covered up and cannot be accessed by normal browsers or search engines and require some particular programs like Tor browser. As the dark web hides the client's identity, it very well may be utilized for legal reasons just as illegal. From sneaking drugs and weapons to other illegal things, from hacking other's data to utilizing those for manufacturing, from duplicating cash to utilizing cryptographic money, the dark web can play various parts in malevolent movements. Then again, the government and other law enforcement agencies utilize the dark web for military applications like online intelligence gathering, sting activity and for other confidential purposes. This paper depicts dark web underlining on how it is accessed, how the tor network works to provide anonymity to its clients, how one can utilize TOR to get to dark web, subtleties on use of dark web for example how unique noxious activities are done utilizing dark web, how the dark web is utilized by terrorist communities to spread terrorism, how the law enforcements are utilizing dark web to reveal some client's real identity and to stop the illegal exercises and the future extent of dark web.

Research paper thumbnail of CYBER INCIDENT RESPONSE Paytm Digital Wallet And Online Transactions Security Measures

Digital 4n6 Journal, 2020

Introduction to Paytm Computer forensics Paytm frauds How it works Security measures Preventive m... more Introduction to Paytm
Computer forensics
Paytm frauds
How it works
Security measures
Preventive measures

Log In