Skip to main content

Who is Parthapratim Dash? | Skills and Experience

Who is Parthapratim Dash? Parthapratim Dash (পার্থপ্রতিম দাশ, पार्थप्रतिम दाश) is a Indian full time Tech Advisor, Freelancer, Explorer, Entrepreneur, Blogger, Information Technology Technician. Social issues Speaker, Learner.

Q. Who is Parthapratim Dash?

A. Researcher | Freelancer | Technician.

I have over a decade of experience in information technology services and business. I have worked with software and hardware solutions for smartphones and computer systems, providing operating system support, data recovery and analysis, cloud computing, information verification, and more.

My passion for technology and business has driven me to continuously learn and experiment, allowing me to keep up with the ever-evolving industry and provide top-notch solutions.

Specialization:

— Information Verification, Data Analysis, Investigation.

— Tech Assistance & Troubleshooting.

— Tech Advisory, Business Solutions.

— Activism, 'Stand up and speak up for a change'.

FREELANCE JOURNEY :

Since 2012, I have worked as a freelancer in various fields, as an external IT Support Technician for many companies, and collaborating on numerous projects across research, web development, data analysis, and other areas. I have served as a research associate for multiple individuals, groups, businesses, non-profit organizations and others, addressing complex issues such as financial fraud and cybercrime through collaborative investigations and data analysis.

● INDEPENDENT VENTURES:

1: 2006—2007.

2: 2006—2007.

3: 2007—2012.

4: 2008—2010.

5: 2008—2010.

6: 2009—2018. 

7: 2012—2016.

8: April 2012—September 2024.

    8-(i): Started in 2012 and is still operational.

● PARTNERSHIP VENTURE:

1/1: May 2014—February 2016.

● Notes:

— I believe in exploring new experiences in everyday life, not just chasing results or certificates.

— Learn from yesterday, live for today, hope for tomorrow.

— Two wheeler motorcycle bike riding is meditation for me.

— Living life at every moment is an adventure for me.

— Feedback plays a powerful role in improving my performance on my journey and helping me understand where I am and why I am there!

— I selectively engage in work that aligns with my own ethics, rules, and decisions. I prioritize facts, ethics, causes, truth, and outcomes over short-term or long-term monetary gain. While I possess expertise in specific areas, this does not obligate me to provide services to everyone, nor accept work solely based on financial reward. I am selective in the clients I work with and only provide services where I am confident in the reasons and outcomes of the work. I collaborate with companies, businesses, individuals, and other organizations, but I maintain the discretion to decline tasks that do not align with my values or ethical principles, even in emergency or disaster situations. I do not compromise my values for financial gain and am committed to maintaining my integrity and humanity in all situations, regardless of external expectations for profit or monetary incentive.

● Focus: Research and Development, Continuous Improvements.

 — All my earnings are more than 60% burned for my skills improvements (day to day in each year), experiments, research and development, and more than 30% for priority basis social services, 10% for daily life. 

— Parthapratim Dash | পার্থপ্রতিম দাশ | पार्थप्रतिम दाश 

_________________________ 

Q. Partha's Skills and Experience:

A. Below mentioned all skills are under Continuous Learning and Experiments from the beginning: 

Skills

Experience and Work Descriptions

IT Support Specialist

Proficient in providing technical support for computer systems, software, and hardware.

Independent Researcher

Experienced in conducting independent research and analysis.

Private Investigator

Skilled in conducting investigations and gathering evidence.

IT Services, Consulting, and Business Solutions

Extensive experience providing IT consulting and business solutions.

Computer PC, Laptop, Smartphone: Software & Hardware Solutions

Proficient in providing software and hardware solutions for computer PC, laptop, and smartphone.

Operating System Support: Linux, Windows, Android

Skilled in providing support for operating systems such as Linux, Windows, and Android.

Data Recovery & Data Analysis

Experienced in providing data recovery and analysis services.

Cloud Computing Solutions

Knowledgeable in providing cloud computing solutions.

Information Verification

Proficient in verifying information and conducting research.

Cyber Security Solutions

Experienced in providing cyber security solutions.

Internet of Things (IOT) Solutions

Proficient in providing solutions for Internet of Things (IoT) devices.


As a self-employed IT Support Specialist, my primary responsibility is to provide technical support and assistance to clients who require IT support services. I ensure that technology systems are running efficiently and effectively, and help to troubleshoot and resolve technical issues as they arise.

  • Providing technical support to clients by phone, email, or in person
  • Troubleshooting and resolving technical issues related to hardware, software, or network systems
  • Installing, configuring, and maintaining hardware and software systems, including updates and upgrades
  • Monitoring and maintaining computer systems and networks to ensure optimal performance and security
  • Implementing appropriate measures to prevent security breaches
  • Collaborating with clients to develop and implement technology solutions that meet their needs and budget
  • Maintaining accurate records of technical issues and solutions
  • Training clients on new software or hardware systems as needed
  • Participating in technology planning and budgeting processes with clients
  • Providing input on the selection and implementation of new technologies



* Most Remarkable Freelancing Works: 

  • 2011 - As a junior research assistant with a individual researcher on web bugs hunting, worked on 4 different project till April 2012. 
  • 2012 - i) As a website auditor for clients till July 2012. ii) As a web developer for 2 different projects till October 2012. iii) As a web app development research assistant for a PhD Scholler till November 2012. iv) As a script writer for a blogger till December 2012. 
  • 2013 - i) As a video mixer/editor for a client till February 2013. ii) As an android app developer for 5 different clients till August 2013. iii) As a cyber security research assistant for a PhD Scholler till December 2013.  
  • 2014 - i) As a data analyst for a corporate lawyer in cyber-crime till March 2014. ii) As a cyber security research assistant for a tech company's cyber security research team till July 2014. iii) As a forensics data recovery (digital footprints) research assistant for a organization till September 2014. iv) As a research assistant for Linux based operating system project for a client till December 2014. 
  • 2015 - i) As a web developer & social media marketing for 2 different clients till March 2015. ii) As an android app developer for a client till April 2015. iii) As a web bug hunting research assistant for a PhD Scholler till June 2015. iv) As a web app developer for a client till July 2015. v) As a cyber security research assistant for a organization till September 2015. vi) As a website auditor for a company till November 2015. vii) As an external (IT) technician & trainer for a company: CRM software & business service 2015 to till October 2016 - call on work - Physical and Remote.
  • 2016 - i) As a data analyst for a organization till March 2016. ii) As a website auditor for clients till July 2016. iii) As a script writer for a social media influencer till August 2016. iv) As a cloud computing project research assistant for a client till October 2016. v) As a research assistant for Linux based operating system project for a tech private firm till November 2016. 
  • 2017 - i) As a cyber security auditor for a organization till July 2017. ii) As a script writer for a digital ad agency till October 2017. iii) As a information verification researcher for a client till December 2017.
  • 2018 - i) As a data analyst for a corporate lawyer in cyber-crime till April 2018, ii) As a research assistant with a corporate company's research team on web bugs hunting, worked on 3 different project till November 2018. 
  • 2019 - i) As a web app auditor for a app developer company till February 2019. ii) As a business analyst for a company till May 2019. iii) As a cyber crime research analyst for a organization till August 2019. iv) As a information verification researcher for a news agency till November 2019. 
  • 2020 - i) As a research assistant: The Internet of things (IoT) Project for a PhD Scholler till February 2020. ii) As a forensics data recovery (digital footprints) research assistant for a organization till May 2020. iii) As a business analyst for a company till September 2020. iv) As a digital marketing advisor for a ad agency till December 2020. 
  • 2021 - i) As a smartphone's forensics data recovery project research assistant for a PhD Scholler till May 2021. ii) As a research assistant for Linux based operating system project for a client till September 2021. iii) As a evidence analysis research associate (corruption cases) for a organization till December 2021.
  • 2022 - i) Research Analyst For Loan Scam, Forex Trading Scams Prevention - Work For A organization till July 2022. ii) Assistant Investigator For Job Moonlighting Scanning, Work Under a organization - till August 2022. iii) As a independent research analyst for a non-profit organization on followed to the cyber crimes in all over India & case investigation - till November 2022.
  • 2023 - i) I worked as a research associate for multiple non-profit organizations in collaboration on more than five projects in 2023. I was assigned from the last week of December 2022 to December 2023. The projects focused on financial fraud/scams, digital ads misleading/scam/spam/deepfake, loan/job/scheme/trading scams, sextortion, cyber bullying, identity theft, digital forensics, artificial intelligence, machine learning, and big data, covering everything from the ground level to the final results. I was involved in sourcing information and overseeing the entire process investigation, identifying loopholes, corruption, and system involvement. The projects delved into questions of who, when, why, how, and outcomes.  Additionally, Right to Information (RTI) activists, Cybersecurity Analyst, Digital Forensics Investigator, Cyber Threat Intelligence Analyst, Incident Response Specialist, Cybercrime Investigator, Forensic Computer Analyst, Cybersecurity Consultant, Cyber Forensic Examiner, Malware Analyst, Network Security Engineer, Big Data Engineer, Domain Experts, AI & ML Engineers and others contributed to these projects.

● Notes: 

"I didn't want to be a part of the stable job journey. I am still happy with my "no work, no pay" lifestyle without any boss or HR-controlled working style. I prefer to live by my own rules and ideologies for as long as I'm alive."

I must give a special credit to my late elder brother who supported me throughout his lifetime. He was there for me from the very beginning when I started my first business in 2006, followed by multiple others. He was a genius and multi-talented individual with a great personality. Although I lost him in November 2016, his wise words continue to inspire me. He used to say, "Never forget your own identity, what you have earned, or who you are from the day you remember yourself. Always be content with what you have and what you can do with your honesty." He donated more than 60% of his earnings to various social services and helped people build their careers in various ways.

He believed that we can learn from everyone, including animals, birds, and humans. Each one has a different life experience that can help us build and improve our life journey.


Popular posts from this blog

Kali Linux AI Integration

Kali Linux is a popular open-source operating system designed for digital forensics and penetration testing. It is based on Debian and comes pre-installed with a wide range of security-related tools, including network analysis tools, password cracking tools, and vulnerability assessment tools. One way that artificial intelligence (AI) is changing the practice of using Kali Linux is by enhancing the capabilities of the tools it includes. For example, AI can be used to improve the accuracy and speed of password cracking tools, allowing users to more efficiently test the security of systems and networks. AI can also be used to automate certain tasks in Kali Linux, such as scanning for vulnerabilities or analyzing network traffic. This can save time and allow users to focus on more complex tasks, such as analyzing and interpreting the results of these scans. In addition, AI can be used to improve the overall user experience of Kali Linux by providing personalized recommendations and assist...

মোবাইল চুরি এবং ছিনতাই: বর্তমান পরিস্থিতি এবং পুলিশের ব্যর্থতা

পশ্চিমবঙ্গ - মোবাইল চুরি এবং ছিনতাই এখন একটি সাধারণ ঘটনা হয়ে দাঁড়িয়েছে। প্রতিদিনই কোথাও না কোথাও এই ধরনের অপরাধ ঘটছে, কিন্তু পুলিশের পক্ষ থেকে প্রতিরোধের কোনো কার্যকরী ব্যবস্থা নেওয়া হচ্ছে না। অপরাধীরা নির্ভয়ে তাদের কার্যক্রম চালিয়ে যাচ্ছে, কারণ তারা জানে যে তাদের আটকাতে পুলিশ প্রায়ই ব্যর্থ। কিছু ক্ষেত্রে পুলিশের সক্রিয়তা দেখা যায়, কিন্তু অধিকাংশ সময়ই তা শুধুমাত্র  পিআর এর জন্য।  "নিউজ এটাচমেন্ট সোর্স - আনন্দবাজার পক্রিকা" রাজ্যের বিভিন্ন স্থানে এই ধরনের র‍্যাকেটগুলো গড়ে উঠেছে, এবং এগুলো কার্যক্রম চালিয়ে যাচ্ছে নির্ভয়ে। সাধারণ মানুষ ভয়ে ভয়ে রয়েছে, আর অপরাধীরা তাদের কাজ চালিয়ে যাচ্ছে। দুর্নীতি, অযোগ্যতা, এবং নিষ্ক্রিয়তা মিলিয়ে পরিস্থিতি দিন দিন খারাপ হচ্ছে। পুলিশের কার্যক্রমের ওপর নির্ভরশীলতা কমে যাচ্ছে এবং বাস্তবতা উপলব্ধি করতে হলে সাধারণ মানুষকেই প্রথম পদক্ষেপ নিতে হবে। মোবাইল ফোন চুরি বা ছিনতাইয়ের ক্ষেত্রে, বেশিরভাগ সময় পুলিশ সাধারণ ডায়েরি (জিডি) এন্ট্রি করিয়ে দেয়, যাতে ঘটনাটিকে মিসিং বা হারিয়ে যাওয়া বলে উল্লেখ করা হয়। এতে পুলিশের এলাকার ক্রাইম রে...

One common use of RAY ID is for tracking web traffic

RAY ID is a unique identification number that is assigned to each device connected to the Internet. It is used to identify and track devices online, and is often used for security purposes. One common use of RAY ID is for tracking web traffic. When a user visits a website, their device is assigned a RAY ID, which is then recorded in the website's server logs. This allows the website owner to track how many unique visitors they have and where they are coming from. RAY ID can also be used for security purposes. For example, it can be used to block access to a website or online service from certain devices, or to prevent unauthorized access to accounts. This is often done by comparing the RAY ID of a device to a list of known malicious RAY IDs. In addition to tracking and security, RAY ID can also be used for personalization. For example, a website might use a RAY ID to remember a user's preferences or to show them personalized content. Overall, RAY ID is a useful tool for trackin...

Sextortion and Deep Fakes: Cyber Crime Awareness

Sextortion and Deep Fake Technology: A Story of Cyber Crime Awareness FADE IN: EXT. CITY STREET - DAY We see a young woman, JESSICA, walking down the street with her headphones on, scrolling through her phone. Suddenly, she receives a message from an unknown number. She opens it to see a video of herself, undressing in front of her laptop. JESSICA (terrified) How did they get this video of me? FADE OUT. FADE IN: INT. JESSICA'S APARTMENT - DAY Jessica is sitting at her laptop, trying to figure out who sent her the video. She googles the unknown number and comes across an article about "SEXTORTION." The article explains that it's a form of cybercrime where someone threatens to share your private photos or videos unless you pay them money. JESSICA (to herself) Oh my god, this is happening to me. FADE OUT. FADE IN: INT. CYBER CRIME UNIT - DAY We see a team of detectives working on cybercrime cases. One of the detectives, JOHN, is giving a presentation to his team about ...

Preventing Cyberstalking and Ensuring Online Safety

Cyberstalking: Understanding the Risks and Ensuring Online Safety. Introduction: The advent of the internet has revolutionized the way we interact with each other. From socializing with friends and family to conducting business transactions, the internet has become an integral part of our lives. However, with the convenience of the internet, there are also dangers that we must be aware of, one of which is cyberstalking. Cyberstalking is a growing concern as more people use the internet, and it can have serious consequences. This article aims to explore cyberstalking and online safety, including what it is, how it works, and how to stay safe. What is Cyberstalking? Cyberstalking is a form of harassment that occurs over the internet. It involves the use of technology, such as email, social media, and messaging apps, to harass, intimidate, or threaten someone. Cyberstalkers often use multiple platforms to target their victims and can use various tactics, including hacking, imperso...

Sextortion: How to Stay Safe in the Digital Age

Understanding Sextortion: Dos and Don'ts Dos Don'ts Do report any suspicious activity to the authorities. Don't engage with the blackmailer or pay any ransom. Do take measures to secure your online accounts and devices. Don't share sensitive or compromising information online. Do use strong passwords and enable two-factor authentication. Don't respond to unsolicited requests or messages. Do educate yourself and others about sextortion and how to prevent it. Don't blame or shame victims of sextortion. Do seek help and support from trusted friends and professionals. Don't delete evidence or tamper with the crime scene. Sextortion is a form of cybercrime where an individual is threatened with the release of private, sensitive or sexually explicit material in exchange for money or other forms of gain. To prevent...

The Dark Side of Deepfake Technology | Cybercrime

Deepfake Technology: An In-Depth Analysis and Implications for Society. Introduction: Deepfake technology is an artificial intelligence (AI) based technology that allows the creation of synthetic media. It uses machine learning algorithms to create manipulated videos, images, and audios that appear to be genuine. Deepfake technology has gained popularity in recent years, especially in the entertainment and media industries. However, it also poses significant challenges to society in terms of its potential to be used for malicious purposes. This paper aims to provide an in-depth analysis of the concept of deepfake technology, its underlying principles, its potential implications, and the current state of research. What is Deepfake? Deepfake refers to synthetic media that is created using deep learning algorithms. It involves training a neural network on a large dataset of images or videos of a particular person, and then using that information to create a convincing likeness of that per...

Combatting Unemployment & Inflation in West Bengal

Unemployment and inflation are two of the most significant economic indicators that can have a major impact on a region's overall well-being. In the Indian state of West Bengal, the unemployment rate and inflation rate have been on the rise in recent years, causing a number of economic and social problems for its residents. In this article, we will explore the causes and impacts of these issues, and discuss some potential steps that could be taken to overcome them in the long-term. The unemployment rate in West Bengal has been increasing in recent years, due in large part to a lack of job opportunities in the state. The lack of job opportunities is caused by a number of factors, including a lack of investment in the state, a lack of manufacturing and industrial development, and a lack of skilled workers. This has led to a large number of people in the state being unemployed, which in turn has led to a number of social and economic problems. One of the major impacts of unemployment ...

The Digital Age: How Vulnerable Are We to Cybercrime?

In recent years, India has seen a significant increase in cybercrime activities due to the rapid growth of internet penetration. With the launch of Reliance Jio in 2016, the cost of mobile internet plummeted, making it more accessible to the masses. While this has led to a surge in the number of smartphone users, it has also resulted in a rise in hacking incidents. Before Jio's launch, mobile internet charges were quite high, with 1GB 2G data costing Rs.98/-* and 1GB 3G data pack costing Rs.155/-*. However, in 2023, 1GB 4G data now costs just Rs.2/-*. This has made smartphones and internet usage more affordable for everyone, but unfortunately, many users lack basic knowledge about the good and bad effects of the internet and how to stay safe online. While some efforts have been made to raise awareness about cybercrime in India, they have not been effective enough. Schools and public awareness campaigns are organized only once or twice a year in certain areas, and legal authorit...