ABOUT ME 

I am determined to be cheerful and happy in whatever situation I may find myself. For I have learned that the greater part of our misery or unhappiness is determined not by our circumstance but by our disposition.

my photography

Showcase my works

OLD TREE

ALONE IN THE DARK

to the top

my hightlands

lost time

memory sounds

lost time

memory sounds

What i am good for

exploit

Research own 44+ Zero day Exploit on Microsoft Office Word/Excel 20010 /2007, Adobe PDF and yahoo mail, etc

antivirus

Invent Gsmart antivirus with 32+ scanning engine with Anti-Executable technology

cloud services

Design ‘Secdrivehd.com’ secure cloud with voice biometric security.

mail

Design & Invent “Secure Mail Key”-First USB 2 factor Token to make your Email service Hacking proof

voice

Design & Invent “Secure voice encryption for mobiles without generate any call logs” –www.cryptvoice.com

training

Provided Onsite/ Offsite IT Security trainings (CEH, CHFI, ECSA, CISSP) to more than 250+ candidates with 100% passing rate in first attempt.

RESPONSIBLITIES

Installation, configuration, monitoring and response to security system (Device control)

investigation

private investigation, confidential investigations such as Pre-Matrimonial, Post-Matrimonial, Pre-Employment, Post-Employment, Individual Profile, Surveillance

education

The world is a book and those who do not travel read only one page