Posts

Sums - Liquidators Remuneration

⋮ Mindvault360 Liquidation - Introduction Sums - Liquidators Remuneration   1. Assets realized: Rs. 6,30,000 including cash balance 30,000 Liquidator's remuneration 2% on the assets realized. Calculate the Liquidator's remuneration. Solution:     Assets realized:        6,30,000     -) cash balance        30,000 ------------ Total Assets realized                       6,00,000                             ------------- Liquidator's remuneration:    6,00,000 x 2/100 ==> 12,000 2. Compute Liquidator’s Remuneration from the information given below: Secured Creditors: Rs. 60,000 (Securities realised: Rs. 80,000) Other Assets realised: Rs. 75,000 Liquidator’s remuneration: 2 ½ % on the amounts reali...

Liquidation - Introduction

⋮ Mindvault360 Liquidation - Introduction Sums - Liquidators Remuneration What is Liquidation? Liquidation is the process of winding up a company's affairs by selling its assets, settling liabilities, and distributing any remaining funds to shareholders. It marks the end of a company's legal existence. Types of Liquidation Voluntary Liquidation – Initiated by the company's members or creditors when the business is no longer viable. Members’ Voluntary Liquidation (MVL) : When the company is solvent but chooses to close. Creditors’ Voluntary Liquidation (CVL) : When the company is insolvent and unable to pay debts. Compulsory Liquidation – Ordered by a court when a company fails to pay creditors or violates legal regulations. Key Participants in Liquidation Liquidator – A professional appointed to oversee the process, sell assets, and distribute funds. Creditors – Entities or individuals to whom the company owes money. Shareh...

Fix OneDrive Personal Vault Not Syncing – What You Need to Know!

Are you struggling with OneDrive Personal Vault not syncing on your device? You're not alone! Many users face this frustrating issue where files inside the Personal Vault fail to sync, causing delays and even potential data loss. Why Is OneDrive Personal Vault Not Syncing? This issue can arise due to several reasons: ✅ Internet Connection Problems – A weak or unstable connection can prevent proper syncing. ✅ Outdated OneDrive App – If you're using an older version, it might have bugs affecting sync. ✅ Corrupted Cache Files – Old or damaged cached data can interfere with syncing. ✅ Insufficient Storage – If your OneDrive storage is full , new files won’t sync. ✅ Sync Conflicts – Multiple devices accessing the same files can cause conflicts. What Can You Do? If you're facing this issue, don’t worry! I’ve put together a detailed video explaining why this happens and how you can prevent it. 🎥 Watch my latest YouTube video for a full breakdown: 👉 https:/...

Social Engineering: Exploiting Human Vulnerabilities

⋮ Mindvault360 CYSA Introduction Cybersecurity Objectives Risk Evaluation Understanding Vulnerabilities, Threats, and Risks in Cybersecurity Risk Assessment Process Enterprise Security Architecture (ESA) Frameworks NIST Cybersecurity Framework (CSF) Overview Penetration Testing Process Footprinting: The First Step in Cyber Reconnaissance Open Source Intelligence (OSINT) in Cybersecurity Social Engineering: Exploiting Human Vulnerabilities  Social engineering is one of the most effective and dangerous attack strategies in cybersecurity. Instead of exploiting technical vulnerabilities , social engineering targets the human element —tricking individuals into revealing confidential information, granting access, or performing actions that compromise security. Attackers use psychological manipulation to exploit trust, urgency, curiosity, or authority to achieve their goals. These attack...

Open Source Intelligence (OSINT) in Cybersecurity

⋮ Mindvault360 CYSA Introduction Cybersecurity Objectives Risk Evaluation Understanding Vulnerabilities, Threats, and Risks in Cybersecurity Risk Assessment Process Enterprise Security Architecture (ESA) Frameworks NIST Cybersecurity Framework (CSF) Overview Penetration Testing Process Footprinting: The First Step in Cyber Reconnaissance Open Source Intelligence (OSINT) in Cybersecurity Social Engineering: Exploiting Human Vulnerabilities  In today’s digital landscape, a vast amount of information is freely available online. Open Source Intelligence (OSINT) refers to the process of gathering and analyzing publicly accessible data to gain insights about an organization, its operations, and individuals associated with it. While cybersecurity professionals use OSINT to strengthen security, attackers leverage the same information to identify vulnerabilities and plan targeted attacks. ...

Footprinting: The First Step in Cyber Reconnaissance

⋮ Mindvault360 CYSA Introduction Cybersecurity Objectives Risk Evaluation Understanding Vulnerabilities, Threats, and Risks in Cybersecurity Risk Assessment Process Enterprise Security Architecture (ESA) Frameworks NIST Cybersecurity Framework (CSF) Overview Penetration Testing Process Footprinting: The First Step in Cyber Reconnaissance Open Source Intelligence (OSINT) in Cybersecurity Social Engineering: Exploiting Human Vulnerabilities Footprinting is the initial phase of cybersecurity intelligence gathering, where attackers (or ethical hackers) collect information about a target organization, system, or network . The goal is to understand the target’s security posture before attempting any exploitation. There are two main types of footprinting : Active and Passive . 1. Active Footprinting Active footprinting involves direct interaction with the target system. This method gathe...

Penetration Testing Process

Image
⋮ Mindvault360 CYSA Introduction Cybersecurity Objectives Risk Evaluation Understanding Vulnerabilities, Threats, and Risks in Cybersecurity Risk Assessment Process Enterprise Security Architecture (ESA) Frameworks NIST Cybersecurity Framework (CSF) Overview Penetration Testing Process Footprinting: The First Step in Cyber Reconnaissance Open Source Intelligence (OSINT) in Cybersecurity Social Engineering: Exploiting Human Vulnerabilities Penetration Testing (Pen Testing) is a controlled cybersecurity assessment where ethical hackers simulate real-world attacks to identify vulnerabilities in an organization's systems, networks, and applications. The goal is to uncover security weaknesses before malicious attackers can exploit them. Key Phases of Penetration Testing 1. Planning & Reconnaissance Define the scope (which systems, networks, or applications will be tested). Identif...