Find A Community
Buy or Renew
Find A Community
Close
Cisco Community
English
Chinese
English
French
Japanese
Portuguese
Russian
Spanish
Register
Login
Register
Login
Register
·
Login
·
Help
All Community
Knowledge base
Anim Saxena
Users
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for
Search instead for
Did you mean:
Results:
cancel
Technology & Support
For Partners
Customer Connection
Webex
Events
Members & Recognition
Cisco Community
:
About Anim Saxena
09-02-2017
Anim Saxena
Beginner
Personal Website
Recent Badges
Awards
Recent Badges
See all
Stats
Member since
09-12-2012
58
Posts
563
Helpful
5
Solutions
Blogs Anim Saxena has Participated In
Latest Contributions by Anim Saxena
Discussions Anim Saxena has Participated In
TKBs Anim Saxena has Participated In
Blogs Anim Saxena has Participated In
Events Anim Saxena has Participated In
Videos Anim Saxena has Participated In
Hi Abhisar,Migration to ACS 5
Created by
Anim Saxena
in
Security Blogs
08-22-2014
08-22-2014
Hi Abhisar,Migration to ACS 5.x possible from version 4.2: ACS 4.2.1ACS 4.2.0.124Things to take care...
Bluetooth Hacking
Created by
Anim Saxena
in
Security Blogs
08-21-2014
08-21-2014
[toc:faq]Bluetooth Technology:Bluetooth can be defined as an open wireless technology standard which...
Mobile Phone Hacking a "Deadly Serpent" in modern era of Technology
Created by
Anim Saxena
in
Security Blogs
06-21-2014
06-21-2014
[toc:faq]What is Mobile Phone hacking?According to Wikipedia "Phone hacking is the practice of inter...
Cryptography
Created by
Anim Saxena
in
Security Blogs
02-19-2014
02-19-2014
What is Cryptography?Cryptography can de defined as practice and study of Hiding information. Modern...
Trojans & Backdoors
Created by
Anim Saxena
in
Security Blogs
08-20-2013
08-20-2013
[toc:faq]What is a Trojan?A Trojan is a program that pretends to be legitimate program, while It is ...
Re: Restrict local Admin user (mgmt purpose) to access VPN on ASA and IOS
Created by
Anim Saxena
in
Security Blogs
05-30-2013
05-30-2013
Hi Jatin,Very helpful information for the users. Nice work.Regards,Anim SaxenaTechnical Community Ma...
Re: Social Engineering
Created by
Anim Saxena
in
Security Blogs
05-07-2013
05-07-2013
Hi Lisa,Thanks for the appreciation. Something catchy should be there so included idea of putting mo...
Understanding Exploit Writing
Created by
Anim Saxena
in
Security Blogs
03-04-2013
03-04-2013
Concept:Exploit is a piece of Software Code written to take advantage of bugs is an application or s...
Re: Wireless Hacking
Created by
Anim Saxena
in
Security Blogs
01-24-2013
01-24-2013
Thanks George for the updated info. Hope it will be helpful for new people.Thanks and Regards,Anim S...
Re: Session Hijacking and Web based Attacks
Created by
Anim Saxena
in
Security Blogs
01-24-2013
01-24-2013
Thanks RobertThanks and Regards,Anim SaxenaTechnical Community Manager
Wireless Hacking
Created by
Anim Saxena
in
Security Blogs
01-24-2013
01-24-2013
Understanding Wireless TechnologyAccording to Wikipedia, Wireless communication is the transfer of i...
Session Hijacking and Web based Attacks
Created by
Anim Saxena
in
Security Blogs
01-23-2013
01-23-2013
Session HijackingBefore Understanding Session Hijacking, first of all we need to understand What is ...
Basic Network Attacks Part 1
Created by
Anim Saxena
in
Security Blogs
11-07-2012
11-07-2012
Before going to attacks you need to understand difference between Hacker and a Cracker?Hacker :Eric ...
Public Statistics
Date Registered
09-12-2012
04:00 AM
Date Last Visited
09-02-2017
08:38 AM
Total Messages Posted
58
Total Helpful Votes Received
563
Helpful Votes Given To
User
Helpful Count
Takashi Higashimura
5
Jatin Katyal
30
hardeep4u
4
Jennifer Halim
20
David White
5
See all >
Helpful Votes From
User
Helpful Count
Justin Reeve
5
bakytbekaliev
5
nwekechampion
5
Jake Sullivan
5
FX
5
See all >