ºÝºÝߣshows by User: swetadargad / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: swetadargad / Wed, 24 Aug 2022 10:48:02 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: swetadargad Sock Puppet.pptx /swetadargad/sock-puppetpptx sockpuppet-220824104802-b4a2d4e4
OSINT Sock puppets are used for doing investigation without getting caught]]>

OSINT Sock puppets are used for doing investigation without getting caught]]>
Wed, 24 Aug 2022 10:48:02 GMT /swetadargad/sock-puppetpptx swetadargad@slideshare.net(swetadargad) Sock Puppet.pptx swetadargad OSINT Sock puppets are used for doing investigation without getting caught <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sockpuppet-220824104802-b4a2d4e4-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> OSINT Sock puppets are used for doing investigation without getting caught
Sock Puppet.pptx from sweta dargad
]]>
197 0 https://cdn.slidesharecdn.com/ss_thumbnails/sockpuppet-220824104802-b4a2d4e4-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Stacks /swetadargad/stacks-152167889 stacks1-190627090527
Data Structure- Stack operations may involve initializing the stack, using it and then de-initializing it. Apart from these basic stuffs, a stack is used for the following two primary operations − PUSH, POP, PEEP ]]>

Data Structure- Stack operations may involve initializing the stack, using it and then de-initializing it. Apart from these basic stuffs, a stack is used for the following two primary operations − PUSH, POP, PEEP ]]>
Thu, 27 Jun 2019 09:05:27 GMT /swetadargad/stacks-152167889 swetadargad@slideshare.net(swetadargad) Stacks swetadargad Data Structure- Stack operations may involve initializing the stack, using it and then de-initializing it. Apart from these basic stuffs, a stack is used for the following two primary operations − PUSH, POP, PEEP <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stacks1-190627090527-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Data Structure- Stack operations may involve initializing the stack, using it and then de-initializing it. Apart from these basic stuffs, a stack is used for the following two primary operations − PUSH, POP, PEEP
Stacks from sweta dargad
]]>
2281 2 https://cdn.slidesharecdn.com/ss_thumbnails/stacks1-190627090527-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
RRD Tool and Network Monitoring /slideshow/rrd-tool-and-network-monitoring/77200980 review4-170623091908
RRD tool is a Round Robin data management system. It could be used with network monitoring to get graphs of network statistics]]>

RRD tool is a Round Robin data management system. It could be used with network monitoring to get graphs of network statistics]]>
Fri, 23 Jun 2017 09:19:08 GMT /slideshow/rrd-tool-and-network-monitoring/77200980 swetadargad@slideshare.net(swetadargad) RRD Tool and Network Monitoring swetadargad RRD tool is a Round Robin data management system. It could be used with network monitoring to get graphs of network statistics <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/review4-170623091908-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> RRD tool is a Round Robin data management system. It could be used with network monitoring to get graphs of network statistics
RRD Tool and Network Monitoring from sweta dargad
]]>
676 4 https://cdn.slidesharecdn.com/ss_thumbnails/review4-170623091908-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Architecture for SNMP based Network Monitoring System /slideshow/architecture-for-snmp-based-network-monitoring-system/77200891 review2-170623091439
Architecture for SNMP based Network Monitoring System contains required approach to design a NMS and its modules which support graphical visualization]]>

Architecture for SNMP based Network Monitoring System contains required approach to design a NMS and its modules which support graphical visualization]]>
Fri, 23 Jun 2017 09:14:39 GMT /slideshow/architecture-for-snmp-based-network-monitoring-system/77200891 swetadargad@slideshare.net(swetadargad) Architecture for SNMP based Network Monitoring System swetadargad Architecture for SNMP based Network Monitoring System contains required approach to design a NMS and its modules which support graphical visualization <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/review2-170623091439-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Architecture for SNMP based Network Monitoring System contains required approach to design a NMS and its modules which support graphical visualization
Architecture for SNMP based Network Monitoring System from sweta dargad
]]>
652 6 https://cdn.slidesharecdn.com/ss_thumbnails/review2-170623091439-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Snmp based network monitoring system /slideshow/snmp-based-network-monitoring-system/77200801 snmpbasednetworkmonitoringsystem-170623091059
SNMP is a Simple Network Management Protocol which could be used to design a Network Monitoring System. This system will use Open Source tools]]>

SNMP is a Simple Network Management Protocol which could be used to design a Network Monitoring System. This system will use Open Source tools]]>
Fri, 23 Jun 2017 09:10:59 GMT /slideshow/snmp-based-network-monitoring-system/77200801 swetadargad@slideshare.net(swetadargad) Snmp based network monitoring system swetadargad SNMP is a Simple Network Management Protocol which could be used to design a Network Monitoring System. This system will use Open Source tools <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/snmpbasednetworkmonitoringsystem-170623091059-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SNMP is a Simple Network Management Protocol which could be used to design a Network Monitoring System. This system will use Open Source tools
Snmp based network monitoring system from sweta dargad
]]>
500 7 https://cdn.slidesharecdn.com/ss_thumbnails/snmpbasednetworkmonitoringsystem-170623091059-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Applications of RFID technology /slideshow/applications-of-rfid-technology/64500814 rfidtechnology-160729063523
RFID technology, How it works and its PROS and CONS]]>

RFID technology, How it works and its PROS and CONS]]>
Fri, 29 Jul 2016 06:35:23 GMT /slideshow/applications-of-rfid-technology/64500814 swetadargad@slideshare.net(swetadargad) Applications of RFID technology swetadargad RFID technology, How it works and its PROS and CONS <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rfidtechnology-160729063523-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> RFID technology, How it works and its PROS and CONS
Applications of RFID technology from sweta dargad
]]>
921 6 https://cdn.slidesharecdn.com/ss_thumbnails/rfidtechnology-160729063523-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber security tutorial2 /slideshow/cyber-security-tutorial2-51125361/51125361 cybersecurity-tutorial2-150731041454-lva1-app6892
Tutorial 2 - Network Defense Tools ]]>

Tutorial 2 - Network Defense Tools ]]>
Fri, 31 Jul 2015 04:14:54 GMT /slideshow/cyber-security-tutorial2-51125361/51125361 swetadargad@slideshare.net(swetadargad) Cyber security tutorial2 swetadargad Tutorial 2 - Network Defense Tools <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-tutorial2-150731041454-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Tutorial 2 - Network Defense Tools
Cyber security tutorial2 from sweta dargad
]]>
1124 8 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-tutorial2-150731041454-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber security tutorial1 /slideshow/cyber-security-tutorial1/50196343 cybersecurity-tutorial1-150706040911-lva1-app6891
]]>

]]>
Mon, 06 Jul 2015 04:09:11 GMT /slideshow/cyber-security-tutorial1/50196343 swetadargad@slideshare.net(swetadargad) Cyber security tutorial1 swetadargad <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-tutorial1-150706040911-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Cyber security tutorial1 from sweta dargad
]]>
1341 4 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-tutorial1-150706040911-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Classifying Cybercrimes /slideshow/classifying-cybercrimes/48828663 cybercrimes-150601072319-lva1-app6892
Cyber crimes are of various types nad very less are are known to regular people. But these regular people are the target of those crimes]]>

Cyber crimes are of various types nad very less are are known to regular people. But these regular people are the target of those crimes]]>
Mon, 01 Jun 2015 07:23:19 GMT /slideshow/classifying-cybercrimes/48828663 swetadargad@slideshare.net(swetadargad) Classifying Cybercrimes swetadargad Cyber crimes are of various types nad very less are are known to regular people. But these regular people are the target of those crimes <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybercrimes-150601072319-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber crimes are of various types nad very less are are known to regular people. But these regular people are the target of those crimes
Classifying Cybercrimes from sweta dargad
]]>
599 6 https://cdn.slidesharecdn.com/ss_thumbnails/cybercrimes-150601072319-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
All about snmp /swetadargad/all-about-snmp allaboutsnmp-140424012753-phpapp01
SNMP which is Simple Network Management Protocol for Monitoring Network Devices]]>

SNMP which is Simple Network Management Protocol for Monitoring Network Devices]]>
Thu, 24 Apr 2014 01:27:53 GMT /swetadargad/all-about-snmp swetadargad@slideshare.net(swetadargad) All about snmp swetadargad SNMP which is Simple Network Management Protocol for Monitoring Network Devices <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/allaboutsnmp-140424012753-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SNMP which is Simple Network Management Protocol for Monitoring Network Devices
All about snmp from sweta dargad
]]>
542 3 https://cdn.slidesharecdn.com/ss_thumbnails/allaboutsnmp-140424012753-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Open source nms’s /slideshow/open-source-nmss/25950232 opensourcenmss-130906040622-phpapp02
]]>

]]>
Fri, 06 Sep 2013 04:06:21 GMT /slideshow/open-source-nmss/25950232 swetadargad@slideshare.net(swetadargad) Open source nms’s swetadargad <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/opensourcenmss-130906040622-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Open source nms’s from sweta dargad
]]>
695 2 https://cdn.slidesharecdn.com/ss_thumbnails/opensourcenmss-130906040622-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cacti /slideshow/cacti-25870853/25870853 cacti-130904005621-
Cacti is an open sourse NMS]]>

Cacti is an open sourse NMS]]>
Wed, 04 Sep 2013 00:56:21 GMT /slideshow/cacti-25870853/25870853 swetadargad@slideshare.net(swetadargad) Cacti swetadargad Cacti is an open sourse NMS <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cacti-130904005621--thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cacti is an open sourse NMS
Cacti from sweta dargad
]]>
2632 4 https://cdn.slidesharecdn.com/ss_thumbnails/cacti-130904005621--thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-swetadargad-48x48.jpg?cb=1662875223 https://cdn.slidesharecdn.com/ss_thumbnails/sockpuppet-220824104802-b4a2d4e4-thumbnail.jpg?width=320&height=320&fit=bounds swetadargad/sock-puppetpptx Sock Puppet.pptx https://cdn.slidesharecdn.com/ss_thumbnails/stacks1-190627090527-thumbnail.jpg?width=320&height=320&fit=bounds swetadargad/stacks-152167889 Stacks https://cdn.slidesharecdn.com/ss_thumbnails/review4-170623091908-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/rrd-tool-and-network-monitoring/77200980 RRD Tool and Network M...