If you received an email from Instagram letting you know that your email address was changed, you may be able to undo this by using the revert this change option in that message. If additional information was also changed (example: your password), and you're unable to change your email address, please report the account to Instagram.
Under section 43, a simple civil offense where a person without permission of the owner accesses the computer and extracts any data or damages the data contained therein will come under civil liability. The hacker shall be liable to pay a fine to the affected party. Under the Information Technology Act, 2000, the maximum cap for compensation was fine at Rs. 1 crore. However in the amendment made in 2008, this ceiling was removed.
This PowerPoint talks about how social media has affected business, marketing, and people's lives. It has become a huge part of our society and has become extremely useful for people all over the world.
Phishing is one of the oldest tricks in the book of hackers. But as old as it might be, phishing still remains the most lucrative tool for cybercriminals. In this presentation, we will help you understand about phishing and tell you how you can avoid phishing attacks.
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
I spent the last few months doing research on various social networks specifically MySpace, Facebook, LinkedIn. Many of us either use these sites or know others that do. Users of these sites have been increasing at a dramatic rate for several years. For example, MySpace was the most visited website in the US with more than 114 million global visitors in 2007, and Facebook increased its global unique visitor numbers by 270% last year alone. With this massive increase in social network usage, online social networking is now becoming the fastest growing area of privacy concerns and security threats.
This PowerPoint talks about how social media has affected business, marketing, and people's lives. It has become a huge part of our society and has become extremely useful for people all over the world.
Phishing is one of the oldest tricks in the book of hackers. But as old as it might be, phishing still remains the most lucrative tool for cybercriminals. In this presentation, we will help you understand about phishing and tell you how you can avoid phishing attacks.
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
I spent the last few months doing research on various social networks specifically MySpace, Facebook, LinkedIn. Many of us either use these sites or know others that do. Users of these sites have been increasing at a dramatic rate for several years. For example, MySpace was the most visited website in the US with more than 114 million global visitors in 2007, and Facebook increased its global unique visitor numbers by 270% last year alone. With this massive increase in social network usage, online social networking is now becoming the fastest growing area of privacy concerns and security threats.
Beware of a Voice Message Phishing Scam on WhatsApp.pptxInfosectrain3
In the first quarter of 2022, we are witnessing the rise in data theft malware activities and numerous malware campaigns. According to reports, these campaigns delivered over 28,000 emails, which led to information-stealing malware targeting sensitive information such as cryptocurrency wallets, files, and SSH keys stored in the system.
Beware of a Voice Message Phishing Scam on WhatsApp.pptxinfosec train
In the first quarter of 2022, we are witnessing the rise in data theft malware activities and numerous malware campaigns. According to reports, these campaigns delivered over 28,000 emails,
https://www.infosectrain.com/
What is Account Takeover - An Introduction to Web FraudNuData Security
Account takeover enables mass credit card fraud, identity theft and damage to brands and their reputation.
We give you a brief overview of Account Takeover, how it happens and how to prevent it.
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
User authentication is a process that allows a website, application, or device to verify the identity of its users. The main purpose of user authentication is to ensure that no third-party or unknown user has access to your account.
Download this eBook for more information: https://bit.ly/3WoKwpy
Cash App is a popular digital wallet and payment system that allows users to send and receive money. But, it is unclear if their account is secure and how to protect it from hackers. Cash App has implemented security measures to protect users from fraud and unauthorized access. Such as encryption and multi-factor authentication. Hacker scan gain access to Cash App accounts by exploiting vulner abilities in systems to gain access to sensitive data. If you are here to find the answer to the question, "Can People Hack Your Cash App?" then you are in the right place
3 Steps to Stopping Social Media Account HacksNexgate
Social media hacks and hijacks are on the rise. Protect your brand and social media marketing programs. Learn the 3 steps to stopping social media account hacks.
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfCIOWomenMagazine
Stay safe online! Protect your privacy & info with these crucial social media cybersecurity tips. From strong passwords to 2FA & privacy settings, learn how to navigate the web securely.
How to Find and Fix Broken Authentication VulnerabilityAshKhan85
In today’s ever-changing digital world, protecting your online presence against vulnerabilities such as failed authentication is critical. IT company provides professional Vulnerability Assessment services that detect and handle such security threats, strengthening the defenses of your website.
Our team of professionals navigates through complex authentication vulnerabilities with accuracy and knowledge, giving personalized solutions that protect your digital assets. Our Vulnerability Assessment provides full security against unauthorized access, data breaches, and possible hacking threats, from resolving defective authentication procedures to deploying effective multi-factor authentication.
Partnering with us means committing your online security to experts who are dedicated to reinforcing your digital firewall. Secure the strength of your website and protect important information by utilizing our cutting-edge Vulnerability Assessment services now!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. TM
If you received an email from Instagram letting you know that your email address
was changed,you may be able to undo this by using the revert this change option in
that message.If additional information was also changed (example:your password),
and you're unable to change your email address, please report the account to
Instagram.
Under section 43, a simple civil offense where a person without permission of the
owner accesses the computer and extracts any data or damages the data contained
therein will come under civil liability.The hacker shall be liable to pay a fine to the
affected party. Under the Information Technology Act, 2000, the maximum cap for
compensation was fine at INR 1 crore.However in the amendment made in 2008,this
ceiling wasremoved.
WAYSTOSECUREYOURACCOUNT
1. To have a strong password is a crucial and basic step to secure one's account.
However, just having a strong password isn't sufficient, one needs a few additional
steps to ensure the security of the account.Two-factor authentication is an effective
measure which requires one to enter a code or typically an OTP (One Time
Password)theyregistered tothe respective account.
2. Keep a look at the login activity of the account and including the devices which
were logged into.
3.Stay updated about emails received in relation to your accounts,if any change can
be seen which is not done by you or under your observation one should report it
immediately.
4.Minimise your platform from complexity as the site becomes complex it is hard to
secure it.
5. One must enable a security framework that involves improving skill sets,
developing and enforcing policies, monitoring, enforcement of periodic
assessment.
6. Have a third party review your online posture, conduct. Many complexities and
infiltrations are preventable by mere steps that include multi factor authentication,
network segmentation andend point protection.
7. Major system hacks are both simple and complex; develop explicit procedures
addressing practicesaround everything from e-mail tosocial media.
INSTAGRAM – HACKING AND
PREVENTION TIPS
3. TM
1. Adopt a social media security solution that includes user authentication and
access management for social media platforms andapplications.
2.Work with your IT department to identify groups or users within your directory
services infrastructure who should have accesstoyour social accounts.
3. Map the employees and partners to the applications to which they should have
access.Create and apply those profiles and mappings in your social media security
tool (e.g.,social response teamcanaccesslistening andpublishing tools).
4.Don't give out direct access to your social media accounts and applications.If you
have in the past,rescind access andnotify your employees andpartners.
5.Make sure your employees know not to share their credentials and why.Education
isacornerstone of good securitypractice.
STEPSTOPREVENT A PHISINGATTACK
1. Limit the number of administrators and applications that have authorized access
to your social media accounts. This helps minimize your attack surface. Use a
password management solution,to ensure your employees and partners don't have
the root credentials toyour socialmedia accounts andapplications.
2. Educate your account administrators on phishing attacks that request their login
credentials. Never click on links in these emails or messages. Instead,
administrators should use their web browser to navigate directly to their social
media account.If the account requires a password change or re-authorization,it will
prompt the user on the webpage directly.
3. Ensure your administrators use strong passwords and that they are always
different from their personal or corporate usernames and passwords.If there are too
many passwords to remember, consider using a secure password vault such as
LastPass, Proofpoint, or OneLogin. These tools provide an added verification
benefit;theywill onlyautomaticallyfill in information on legitimate sites.
5TIPSTOPROTECTYOURINSTAGRAM ACCOUNTFROM BEING HACKED:
« Pick aStrong Password
« Turn onTwo-FactorAuthentication
« Make SureYour EmailAccount isSecure
« Revoke Access toSuspiciousThird-PartyApps
« Don'tclick on anyunknown links or images or videos
STEPS TO REDUCEYOUR RISK
OF A SECURITY THREAT, HACK &
EMPLOYEE MISUSE OFYOUR ACCOUNTS
4. TM
1. Ensure administrators only access your social media
accounts from trusted machines and require them to log out
aftereach session.
2. Ensure administrators always use secure connections (i.e.,
HTTPS) when logging in.
3. Use authorized publishing, listening, and other social
media tools to access your social media accounts. Do not
directly login to social media networks, unless necessary.
When you must login directly, use a trusted and clean
computer.
4. Ensure your administrators use trusted devices to access
your social accounts and that the devices are running up-to
dateanti-malware software.
WHAT TO DO IF YOU OBSERVE FRAUDULENT
ACTIVITIES.
1. If you observe any unusual activates on your account you
should change the password immediately and kick out the
hacker ifany.
2. If your accounts password is changed put it for reset and
then change itthrough your mailaccount.
3. If your password is changed even the contact details are
changed then reportthe accountfor further steps.
WEBSITE SUPPORT TEAM
1. Facebook report a hacked account:
www.facebook.com/hacked
2.Twitter support request:
support.twitter.com/forms/signing
3. Google+ account recovery:
www.google.com/accounts/recovery
4.YouTube hacked account:
support.google.com/youtube/answer/76187?hl=en
5. Instagram hacked accounts:
5 STEPS TO PREVENT TARGETED
BROWSERS AND COOKIE ATTACKS
5. TM
Option #1:UseInstagram'sNewAccount Recovery Process
« Here'showitworks:
« If you can't access your Instagram account because the password was changed
by a hacker, you can tap the “My login info isn't working” button, which will
prompt you to enter the email address or phone number linked to your account or
the ones used when you signed uptoInstagram.
« Instagram will then send a six-digit code to allow you to regain access to the
account.
Option #2:UseInstagram'sOld Account Recovery System
Step#1:CheckYour Email Account for aMessage from Instagram
Onthe login screen,tapForgotpassword?
#2:VerifyYour Account
« A photo of yourself holding apaperwithahandwrittencode we've provided you.
« The email address or phone number you signed up with and the type of device
you used atthe time of sign up(example:iPhone,Android,iPad,other).
« Once you provide information to help us verify your identity, we'll send you
specific instructions to recover your account at the secure email address you
provided.
INCIDENTSRELATEDTOSOCIALMEDIAHACKING
In India,Delhi reports 50 cases of Instagram hacking per day.Hackers are targeting
those who have a substantial following.These accounts are then being sold to those
looking to exploit the followers and push their products on Instagram that has about
1 billion users. Following are few incidents where Instagram accounts of famous
celebrities were hacked;
Swapnil Joshi:An attempt was made to hack the Instagram account of Swapnil Joshi.
Cautiously the social media management team of Swapnil Joshi bounced back his
account without much damage.Actor Swapnil Joshi has posted a video on Instagram
describing this horrifying experience. He has tried to create awareness about how
they cheat you through a verified account to sneak into your privacy settings.
Swapnil Joshi also clarified that there were repeated attempts to ask for passwords
aswell.
HOW TO PROTECTYOUR INSTAGRAM
ACCOUNT FROM BEING HACKED
6. TM
To request alogin link:
1. On the login screen, tap Get help signing in (Android) or Forgot password?
(iPhone).
2. Next, choose either your email address or phone number to have the login link
sent toandthen tapNext.
3.Once you receive the login link,followthe on-screen instructions.
« Recover the accountifit'sdeleted
« Reportthe account
To report ahacked account on Instagram:
« OnAndroid:
1.Onthe login screen,tapGethelp signing in belowLog In.
2. Enter your username, email, or phone number, then tap Next. Learn more about
whatyou cando ifyou don'tknowyour username.
3.TapNeed more help? then followthe on-screen instructions.
« Be sure to enter a secure email address that only you can access. Once you've
submitted your request,be on the lookout for an email from Instagram with next
steps.
OniPhone:
1.Onthe login screen,tapForgotpassword?
2.TapNeed more help? belowthe Nextbuttonandfollowthe on-screen instructions.
« Be sure to enter a secure email address that only you can access. Once you've
submitted your request,be on the lookout for an email from Instagram with next
steps.
« Verify your identity
« Once you submit your request, you should receive an auto-response email from
the Security Team at Instagram asking you to help Instagram verify your identity.
You'llbe asked for one or both of the following:
« A photo of yourself holding apaperwithahandwrittencode we've provided you.
« The email address or phone number you signed up with and the type of device
you used atthe time of sign up(example:iPhone,Android,iPad,other).
« Once you provide information to help Instagram verify your identity, we'll send
you specific instructions to recover your account at the secure email address you
provided.
METHODS TO DO RECOVER
YOUR ACCOUNT
7. TM
Legal action against hackers;
In India the InformationTechnology Act,2000 and the amendments made thereafter
tries toprotecteveryindividualfrom black hathackers.
Section 43 specifies almost every kind of hacking offence from illegal access data
contamination, manipulation, data destruction, network disruption, removal or
alteration of data-to-data theft, illegal concealment of data, etc. Further this section
imposes apenaltyon hacker tocompensate for the damage incurred towardsvictim.
Section 66 of the Act,further punishes the one who dishonestly or fraudulently does
any act referred under section 43 of Act with the punishment for a term of 3Years or
withfine thatmayextendtofive lakh rupees or both.
Therefore, relying on this provision Indian law duly supports the innocent people
againstthe actof hacking.
Now,if the website of any organization is hacked then he should firstly stay calm,as
he is protected by the law of India. Now as an immediate action, he should take the
following steps:
« Take the website offline:as an immediate step the organization shall temporarily
shut down the website,while it is fixed and protected.This step is taken to prevent
further damage tothe clients of the organization.
« Secondly,immediately file a cyber complaint:as an immediate step,file a cyber
complaint in the cyber cell of the district in which the registered office of the
organization is located. If there is no cyber cell in the district, the organization
could also file a complaint online www.cybercrime.gov.in (which also provides
anadvantage of tracking the complaint,which isotherwise not available)
« A cyber complaint is drafted in a very similar way as FIR is drafted.The important
thing to remember is that all necessary details of the crime are mentioned in the
complaint. Further, with the cyber complaint, some copies of documents are
required tobe attached,which are generallynot attachedwhen the FIRisdrafted.
nnn
LEGAL ACTION
8. INSTAGRAM HACKING
TRUTH & MYTHS
DIGITAL TASK FORCE
TM
DIGITAL MAGZINE
DEC -2020
« Digital Forensic Solutions
« 65 b Certificate & HashValue Calculation
« RBI Cyber Security Audit Compliance
« Drafting of RBI Cyber Security Policies
« Vulnerability Assessment & Penetration Testing
« Cyber Crime Investigation
« Information Security Audits
« Digital Crime & Fraud Investigations
« All types of Detective & Surveillance Services
« Ransomware Removal Services
« Handwriting/ Signature Analysis
« Fingerprint Analysis
« Audio &Video & Social Media Transcript
« Digital Data Destruction
« DataTheft Investigations
« Cyber LabEstablishment
« Information Security Assessment Services
« PCIDSSCompliance
« HIPPA Compliance
« Incident Management Services
« FinancialFraud Investigations
« Crime Scene Investigations
« InsuranceClaimInvestigation
« IT/ITESSecurity ConsultingServices
« Cyber Advocacy
« CorporateTraining&Awareness Programs
GROUP OF COMPANIES
SWADESHI
FILINGS
TM
GLOBAL CYBER CRIME HELPLINE
OUR OFFERINGS
+918149128087
Rohan Nyayadhish
rohan@dtfservice.com www.dtfservice.com
OUR PRESENCE: PUNE | MADHYA PRADESH | SATARA
+919371971010
65 b Certificate