Posts

Aadhaar 2.0: AADHAAR EVOLUTION – From Privacy to Efficacy

The Hacking of NIC Servers/Computers of MeitY, Govt. of India - The Case Study (E-Mail Spoofing & Phishing Attack)

What is Data: Its Types, Usage and Storage

The Project Management Fundamentals