SlideShare a Scribd company logo
Prahari - ANTI-HACKING ASSOCIATION
Prahari - ANTI-HACKING ASSOCIATION
PRAHARI-The Anti-Hacking Association
is started by IT Professor Vishal Kaushik
of University of Petroleum and Energy
Studies with a vision to make Internet a
safer and secure place to work upon.
Prahari - ANTI-HACKING ASSOCIATION
As we know that Hacking is mushrooming at
a very fast pace in todays world which is
causing damage to people personal data
and disrupting their privacy on Internet and
busting their credentials. To prevent people
from this theft and to create awareness
among them, Mr. Vishal Kaushik with their
team of another 5 students of B.Tech CSE of
the same university decided to take a step
forward to serve the netizens.
Prahari - Objectives
 To create awareness on security issues.
 Training on computers and security
loopholes.
 To track down and explore various
exploits.
 Training on setting up secured servers.
Prahari - Objectives
a. To create awareness on security issues :
Basically this association’s aim is to create
awareness on security issues of the wide
spread internet. This association would
educate people about how a hacker can
hamper ones peace of mind. Our purpose is
to educate the masses by throwing light on
all the security vulnerabilities which are
targeted by Hackers to gain access to their
private credentials.
Prahari - Objectives
b. Training on computers and security
loopholes: Most of the netizens are still
unaware f small loopholes and hence get
trapped by a hacker very easily.
Our organization would train the masses
on basic computer and security
knowledge that would help them stay
miles away from hackers.
Prahari - Objectives
c. To track down and explore various
exploits: The cyber world is full of countless
applications, modulations and extentions.
The more is this world expanding, the more it
is getting owned. Our ambition is to track
down every available exploit and fix it before
it gets owned by a hacker. Our dedicated
R&D department has found out many
security loopholes, exploits etc in its near
past.
Prahari - Objectives
d. Training on setting up secured servers:
“There are a thousand hacking at the
branches of evil to one who is striking at the
root.”
The servers in any organization stores all the
important details of its company. Starting
from business letters to company’s secret.
Hence it becomes extremely important to
secure the servers.
Our association would train people of all
sectors on hosting up secured servers and
Prahari - Objectives
e. Counseling to the victim :
Our association would also help all the
victims of hacking to overcome the flaws in
their applications and how to make
themselves secure.
We are proud to announce ,
TAC – Threats, Attacks & Counte
Prahari’s news letter
We are proud to announce ,
TAC – Threats, Attacks & Counter
Prahari’s Monthly news letter

More Related Content

What's hot

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
Home
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber Security in Bangladesh
Cyber Security in Bangladesh Cyber Security in Bangladesh
Cyber Security in Bangladesh
Mohiuddin Murad
 
WEB SECURITY
WEB SECURITYWEB SECURITY
WEB SECURITY
MDERAMTALUKDER
 
Indian Cyber Army
Indian Cyber ArmyIndian Cyber Army
Indian Cyber Army
tushar garg
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
Tyrone Grandison
 
Web security by khubaib
Web security by khubaibWeb security by khubaib
Web security by khubaib
Khubaib Ahmad Kunjahi
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
PranjalShah18
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Internet security
Internet securityInternet security
Internet security
MangoDigitalSolution
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
Vansh Bathla
 
Cyber security
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Sanjana Agarwal
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
Internet security
Internet securityInternet security
Internet security
Tapan Khilar
 
Cyber security
Cyber security Cyber security
Cyber security
Shivam Yadav
 

What's hot (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Security in Bangladesh
Cyber Security in Bangladesh Cyber Security in Bangladesh
Cyber Security in Bangladesh
 
WEB SECURITY
WEB SECURITYWEB SECURITY
WEB SECURITY
 
Indian Cyber Army
Indian Cyber ArmyIndian Cyber Army
Indian Cyber Army
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Web security by khubaib
Web security by khubaibWeb security by khubaib
Web security by khubaib
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet security
Internet securityInternet security
Internet security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Internet security
Internet securityInternet security
Internet security
 
Cyber security
Cyber security Cyber security
Cyber security
 

Similar to Prahari

Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
yusifagalar
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
Blue Cross Blue Shield of Michigan
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
20ArnavKumar8F
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
SejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
RahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Tushar Nikam
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
Yashwanth Rm
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
cybersec sumit (1).pptx
cybersec sumit (1).pptxcybersec sumit (1).pptx
cybersec sumit (1).pptx
sumitkumar917666
 
Major Prc.pptx
Major Prc.pptxMajor Prc.pptx
Major Prc.pptx
DatlaSravya1
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
RavirajChavan10
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
KalponikPrem
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
ijtsrd
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdf
Dipak Tiwari
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
Vamshi963187
 

Similar to Prahari (20)

Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
cybersec sumit (1).pptx
cybersec sumit (1).pptxcybersec sumit (1).pptx
cybersec sumit (1).pptx
 
Major Prc.pptx
Major Prc.pptxMajor Prc.pptx
Major Prc.pptx
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdf
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
 

Recently uploaded

cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 

Recently uploaded (11)

cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 

Prahari

  • 2. Prahari - ANTI-HACKING ASSOCIATION PRAHARI-The Anti-Hacking Association is started by IT Professor Vishal Kaushik of University of Petroleum and Energy Studies with a vision to make Internet a safer and secure place to work upon.
  • 3. Prahari - ANTI-HACKING ASSOCIATION As we know that Hacking is mushrooming at a very fast pace in todays world which is causing damage to people personal data and disrupting their privacy on Internet and busting their credentials. To prevent people from this theft and to create awareness among them, Mr. Vishal Kaushik with their team of another 5 students of B.Tech CSE of the same university decided to take a step forward to serve the netizens.
  • 4. Prahari - Objectives  To create awareness on security issues.  Training on computers and security loopholes.  To track down and explore various exploits.  Training on setting up secured servers.
  • 5. Prahari - Objectives a. To create awareness on security issues : Basically this association’s aim is to create awareness on security issues of the wide spread internet. This association would educate people about how a hacker can hamper ones peace of mind. Our purpose is to educate the masses by throwing light on all the security vulnerabilities which are targeted by Hackers to gain access to their private credentials.
  • 6. Prahari - Objectives b. Training on computers and security loopholes: Most of the netizens are still unaware f small loopholes and hence get trapped by a hacker very easily. Our organization would train the masses on basic computer and security knowledge that would help them stay miles away from hackers.
  • 7. Prahari - Objectives c. To track down and explore various exploits: The cyber world is full of countless applications, modulations and extentions. The more is this world expanding, the more it is getting owned. Our ambition is to track down every available exploit and fix it before it gets owned by a hacker. Our dedicated R&D department has found out many security loopholes, exploits etc in its near past.
  • 8. Prahari - Objectives d. Training on setting up secured servers: “There are a thousand hacking at the branches of evil to one who is striking at the root.” The servers in any organization stores all the important details of its company. Starting from business letters to company’s secret. Hence it becomes extremely important to secure the servers. Our association would train people of all sectors on hosting up secured servers and
  • 9. Prahari - Objectives e. Counseling to the victim : Our association would also help all the victims of hacking to overcome the flaws in their applications and how to make themselves secure.
  • 10. We are proud to announce , TAC – Threats, Attacks & Counte Prahari’s news letter
  • 11. We are proud to announce , TAC – Threats, Attacks & Counter Prahari’s Monthly news letter