SlideShare a Scribd company logo
1 of 56
ONLINE SEFTY AND AWARNESS
OF OPERATION AND SECURITY
OF DIGITAL DEVICES
MEHEDI HASAN
JOB EXPERIENCE: 16 YEAR
Adviser CCA foundation
LOGIK EYE FORENSICS
Indonesia
Malaysia
Vietnam
Singapore
India
Thailand
Nepal
China
Jakarta, Bali, Sumatra (3)
Kualalampur (2)
Ho chi min, Hanoi (2)
Singapore City (3)
Delhi, Agra, Kolkata, Chennai
Bangkok, Pataya, Puket
Kathmandu
Shanghai, Beijing
Sri Lanka Colombo
A Business man lives in
Dhaka. Used to social
media for business and
relation.
He receive a phone
call from an unknown
number.
Biggest cyber crime
involving privacy
invasion in the world!
CASE STUDY
WE CAN START NOW
CYBER CRIME
INTRODUCTION
Topic of the section Cyber
crime, Cyber Attacks,
Hacker, Hacking etc.
TYPES OF CYBER ATTACKS
Topic of the section,
Malware, Virus, Trojan,
Steps of hacking etc
IMPACT OF INTERNET
Topic of the section, Positive
and negative impact of
internet.
01
02
03
04
05
06
SOCILA ENGINEERING
ATTACKS
Steganography, Data hiding
technology, Encryption,
Decryption, Spoofing, etc
DIGITAL FORENSICs
ATTACKS
Evidence collection, Types of
forensics, different types
of technique, Anti-
Forensics, tips of analysis.
SECURITY AND SEFTY
Strong password, Device
security, Smartphone
security, malware
detecting, cleaning etc
HACKING: Unauthorized access in a system
জালিযালি এবং আলথিক অপরাধ
সাইবার সন্ত্রাস ও চাাঁদাবালজ, হযরালি ও হুমলক ধামলক
পিিগ্রাফী ধারি, সংরক্ষণ, লবিরি, সহাযিা
সাইবার যুদ্ধ
অিিাইি জুযা
অিিাইনি কাউনক আঘাি করা অপদস্থ করা
ফফক আইলি / ছদ্দনবশ ধারণ
Phishing Attack
Man-in-the-Middle Attack
SQL Injection Attack
Denial-of-Service, Brute-Force and Dictionary attacks
XSS Attacks
Ransomware Attacks
Malware Attack
Session Hijacking
Zero-Day - Attack
TYPE ATTACKS
WEB BASED
DEVICE BASED
WEB-BASED ATTACKS
INJECTION ATTACK
DENIAL OF SERVICE (DOS)
BRUTE FORCE
PHISHING ATTACKS
WEB-BASED ATTACKS
SYSTEM-BASED ATTACKS
CYBER ATTACKS AND CRIME
STEPS OF CYBER CRIME
STEP 1: IDENTIFY THE VICTIM
STEP 2: INFORMATION GATHERING.
STEP 3: IDENTIFY LOOPHOLE.
STEP 4: ACTUAL HACK.
STEP 5: ESCAPE WITHOUT TRACE.
Hacking into computer, is just like breaking into a house
WWW.ANONYMIZER.IN/FAKE-MAILER/
Email Spoofing is the art of sending a spoofed email from somebody else’s email account.
PHISHING ATTACKS
Phishing is the attempt to acquire sensitive
information, often for malicious reasons, by
masquerading as a trustworthy entity in an electronic
communication
PHISHING USING WEBSITE
SET (SOCIAL ENGINEERING TOOLKIT)
HTML/JAVA SCRIPT VIHSING
APK TERMUX
PHISHING ATTACKS
SET (SOCIAL ENGINEERING TOOLKIT)
PHISHING ATTACKS
Phishing java script code
PHISHING ATTACKS
www.virustotal.com
Viruses
Trojans
Rootkits
Worms
Spyware
Crimeware
Adware
MITM attack is a general term for when a perpetrator
positions himself in a conversation between a user and an
application—making it appear as if a normal exchange of
information is underway.
INTERCEPTOT
Hardware Keylogger
INVESTIGATIONS
FORCE STOP THE APPS
ROOT THE DEVICE
EXTRACT SYSTEM
https://youtu.be/ZF6dc6nt25U
USE UPDATED ANTIVIRUS
SCAN YOUR SYSTEM REGULARLY
SCAN FLASH MEDIA/DRIVE
BEFORE USE.
IMPACT OF INTERNET
IMPACT OF INTERNET
IMPACT OF INTERNET
NEGATIVE IMPACT
POSITIVE IMPACT
IMPACT OF INTERNET
লিন াসি
NEGATIVE IMPACT
লশশু পণিগ্রালফ
মাদনকর প্রসার িারী ও লশশু পাচার
শারীলরক গঠি ও মািলসক লবকানস অপলরপক্কিা
উগ্রবাদী মনিা াব ও গাঁজব
মািহালি ও মািহালিকর িথয প্রচার
IMPACT OF INTERNET
Addiction
IMPACT OF INTERNET
Personality
IMPACT OF INTERNET
িথয প্রালি ও সংরক্ষণ
POSITIVE IMPACT
ফযাগানযাগ
অিিাইি লশক্ষা
অিিাইি বযাবসা বালণনজযর প্রসার
অিিাইনি লচলকৎসা ফসবা
লশশু লশক্ষা ও লবনিাদি
SOCIAL ENGINEERING ATTACKS
Deepfake is an artificial intelligence-based human image
synthesis technique
• Mobile phones were used.
DIGITAL FORENSICs & INVESTIGATIONS
Forensics is the application of science to solve a
legal problem
Digital Forensics is a part of forensic science (in
relation to computer crime) focusing on the
recovery and investigation of material (essentially
data) found in digital devices.
In a word, It is recovery Science
DELETED FILES
LOGS
SPECIAL SYSTEM FILES (REGISTRY ETC.)
EMAIL ARCHVES, PRINTER SPOOLS
ADMINIRTRATIVE SETTING
INTERNET HISTORY
CHAT ARCHIVES
ENCRYPTED FIELS /PASSWORD PROTECTED
FILES
A talented young boy
of 14/15 years who was
studying late went out
of the house to take
the exam and left his
bag and notebook in a
nearby shop and
disappeared.
The boy's parents filed
a complaint with the
law enforcement
agencies.
ATTACKS
Deleted SMS recovery by forensics
General Forensic Investigations
JTAG Forensic Investigations
CHIP-OFF Forensic Investigations
GPS INVESTIGATION
https://myactivity.google.com/more-activity
GPS INVESTIGATION
GPS INVESTIGATION
https://www.google.com/maps/timeline?pb=!1m2!1m1!1s2018-06-22
ARTIFICIAL INTELLIGENCE
ChatGPT
ChatSonic
Bard
CoPilot
The New Bing (Bing AI)
Character Certificate
Statement of Certificate
40%
10%
2%
8%
10%
12%
2% 3%
8%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
Character Chart
2019
This is to certify that
RAHIM son/daughter
of…YYYY…………is well
known to FACEBOOK
Ind. Since last
…2011….years and…..
month. To the best of our
knowledge and belief he/she
bearing following character.
Note : Pother pacali, রঙ্গমঞ্চ, গরুঠাকুর megh-Balika also known as Rahim that’s fake ID
ANTI FORENSICS
Anti forensics (sometimes counter
forensics) is a general term for a set
of techniques used as
countermeasures to forensic analysis.
DELETED FILES
LOGS
SPECIAL SYSTEM FILES (REGISTRY ETC.)
PASSWORD CHANGING POLICY.
DON’T USE SIMPLE PASSWORD. (APNI123, 123456, 098765, 0171300056,
APNI00056)
DON’T CLICK ON UN TRUSTED LINK.
SPOOFING EMAIL (LOTTERY, GIRLFRIEND/BOYFRIEND, JOB)
REMOVE UNKNOWN FRIEND SOCIAL MEDIA.
USE STRONG PASSWORD.
DO NOT GIVE YOUR DEVICE TO UN TRUSTED PEOPLE.
.
https://facebook.com/mehedi0001
+880-1973000056
Be with
someone who
will warning
you about
cyber attack

More Related Content

Similar to ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES

An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 

Similar to ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES (20)

unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 

More from Mehedi Hasan

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
Mehedi Hasan
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
Mehedi Hasan
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
Mehedi Hasan
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
Mehedi Hasan
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
Mehedi Hasan
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
Mehedi Hasan
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
Mehedi Hasan
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 

More from Mehedi Hasan (20)

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdf
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation training
 
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 

Recently uploaded

Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Apsara Of India
 
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Ifra Zohaib
 
Goa Escorts Service 9540619990 Call Girls in Goa
Goa Escorts Service 9540619990 Call Girls in GoaGoa Escorts Service 9540619990 Call Girls in Goa
Goa Escorts Service 9540619990 Call Girls in Goa
Goa escorts Service 😋 Goa escort agency
 

Recently uploaded (20)

Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book nowAgra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
 
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
 
Prince Armahs(Tinky) Brochure, for Funeral service
Prince Armahs(Tinky) Brochure, for Funeral servicePrince Armahs(Tinky) Brochure, for Funeral service
Prince Armahs(Tinky) Brochure, for Funeral service
 
Motihari ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In motihari ❤ Low ...
Motihari ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In motihari ❤ Low ...Motihari ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In motihari ❤ Low ...
Motihari ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In motihari ❤ Low ...
 
Vadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book now
 
Call Girls Nagpur Just Call 7877523032 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 7877523032 Top Class Call Girl Service AvailableCall Girls Nagpur Just Call 7877523032 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 7877523032 Top Class Call Girl Service Available
 
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEAGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
 
Mysore❤CALL GIRL 9647466585 ❤CALL GIRLS IN Mysore ESCORT SERVICE
Mysore❤CALL GIRL 9647466585 ❤CALL GIRLS IN Mysore ESCORT SERVICEMysore❤CALL GIRL 9647466585 ❤CALL GIRLS IN Mysore ESCORT SERVICE
Mysore❤CALL GIRL 9647466585 ❤CALL GIRLS IN Mysore ESCORT SERVICE
 
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALAAMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
 
Vip Call Girls Hyderabad Just Call 7091864438 Top Class Call Girl Service Ava...
Vip Call Girls Hyderabad Just Call 7091864438 Top Class Call Girl Service Ava...Vip Call Girls Hyderabad Just Call 7091864438 Top Class Call Girl Service Ava...
Vip Call Girls Hyderabad Just Call 7091864438 Top Class Call Girl Service Ava...
 
Latur ❤CALL GIRL 9647466585 ❤CALL GIRLS IN Latur ESCORT SERVICE
Latur ❤CALL GIRL 9647466585 ❤CALL GIRLS IN Latur ESCORT SERVICELatur ❤CALL GIRL 9647466585 ❤CALL GIRLS IN Latur ESCORT SERVICE
Latur ❤CALL GIRL 9647466585 ❤CALL GIRLS IN Latur ESCORT SERVICE
 
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...
 
Hubli❤CALL GIRL 9647466585 ❤CALL GIRLS IN Hubli ESCORT SERVICE
Hubli❤CALL GIRL 9647466585 ❤CALL GIRLS IN Hubli ESCORT SERVICEHubli❤CALL GIRL 9647466585 ❤CALL GIRLS IN Hubli ESCORT SERVICE
Hubli❤CALL GIRL 9647466585 ❤CALL GIRLS IN Hubli ESCORT SERVICE
 
ULHASNAGAR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
ULHASNAGAR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEULHASNAGAR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
ULHASNAGAR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Hosur ❣️ CALL GIRLS 7091864438 CALL GIRLS in Hosur ESCORT SERVICE AVAILABLE...
Hosur ❣️ CALL GIRLS 7091864438  CALL GIRLS in Hosur ESCORT SERVICE  AVAILABLE...Hosur ❣️ CALL GIRLS 7091864438  CALL GIRLS in Hosur ESCORT SERVICE  AVAILABLE...
Hosur ❣️ CALL GIRLS 7091864438 CALL GIRLS in Hosur ESCORT SERVICE AVAILABLE...
 
Goa Escorts Service 9540619990 Call Girls in Goa
Goa Escorts Service 9540619990 Call Girls in GoaGoa Escorts Service 9540619990 Call Girls in Goa
Goa Escorts Service 9540619990 Call Girls in Goa
 
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
 
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICEMORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
 
Guwahati CALL GIRL 9874883814 CALL GIRLS IN guwahati ESCORT SERVICE CALL GIRL...
Guwahati CALL GIRL 9874883814 CALL GIRLS IN guwahati ESCORT SERVICE CALL GIRL...Guwahati CALL GIRL 9874883814 CALL GIRLS IN guwahati ESCORT SERVICE CALL GIRL...
Guwahati CALL GIRL 9874883814 CALL GIRLS IN guwahati ESCORT SERVICE CALL GIRL...
 

ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES