PinnedAbhishek pawarBuild Your Own Secure VPN : A Complete Guide to Enhanced Online PrivacyIf you’re a college student with a student email ID, you can easily set up your own self-hosted VPN for free on Azure Cloud. Azure Cloud…Jun 8Jun 8
Abhishek pawarUpgrade Your Old Laptop: Create a Home Server or Cloud with Simple StepsI had my father’s old laptop, an HP Elitebook with an i5 processor, 2GB DDR3 RAM, and a 256GB hard drive. This laptop could be utilized to…Apr 7Apr 7
Abhishek pawarSecured 5th place in the National Entrepreneurship Challenge (NEC) at E-Summit 24, IIT BombayIn February 2024, our team E-cell MET From MET Bhujbal knowledge city institute of technology Nashik, Maharashtra embarked on a thrilling…Feb 251Feb 251
Abhishek pawarA Beginner’s Guide to Cyber Forensics: Unveiling Digital MysteriesExploring the World of Cyber ForensicsAug 24, 2023Aug 24, 2023
Abhishek pawarHow to hack Social Media accountsThis Blog is beginner-Friendly and Written with help of AI.Jan 26, 2023Jan 26, 2023
Abhishek pawarLinux PermissionsLinux permissions allow the owner of a file or directory to control access to that file or directory. There are three types of permissions…Jan 25, 20231Jan 25, 20231
Abhishek pawarWeb Fuzzing Using ffuf toolWeb fuzzing is a technique used to identify security vulnerabilities in web applications by providing unexpected or malformed inputs to the…Jan 23, 2023Jan 23, 2023