Lets Chat


Bug Bounty Program


Welcome to the Bug Bounty Program at ComputerBaba.co.in!

 At ComputerBaba.co.in, we are committed to ensuring the highest level of security for our systems and infrastructure. We believe in the power of the security community and value the expertise and efforts of ethical hackers in helping us identify and address vulnerabilities. Our Bug Bounty Program provides an opportunity for skilled individuals like you to contribute to our security efforts while earning recognition and rewards.

Program Guidelines:

  1. Eligibility: The Bug Bounty Program is open to all individuals, regardless of their location or affiliation. However, employees and their immediate family members are not eligible to participate.
  2. Scope: The program covers websites ComputerBaba.co.in.
  3. Responsible Disclosure: We kindly request that you report any discovered vulnerabilities promptly and responsibly. Do not perform any destructive actions or disclose vulnerabilities to others before we have had a chance to address them.
  4. Prohibited Actions: In order to participate in the Bug Bounty Program, you must adhere to the following rules:a. Do not attempt any brute-force attacks or any actions that could harm the availability or integrity of our systems.b. Do not access or modify any user data beyond what is necessary to demonstrate the vulnerability.c. Do not perform any DOS, DDOS, social engineering, or phishing attacks against our employees, users, or partners.

    d. Do not publicly disclose any vulnerabilities until we have confirmed and addressed them.

  5. Rewards and Recognition: We believe in recognizing the efforts of ethical hackers who contribute to the security of our systems. Rewards will be offered in the form Hall of Fame.
  6. Hall of Fame: Our Hall of Fame acknowledges the valuable contributions made by ethical hackers. If your vulnerability submission is verified and fixed, we will credit your name or preferred alias in our Hall of Fame, demonstrating our appreciation for your efforts.
  7. Reporting Vulnerabilities: To submit a vulnerability, please provide a detailed report outlining the steps to reproduce the issue, along with any supporting material such as proof-of-concept code or screenshots. Submit your findings via email to support@computerbaba.co.in.
  8. Response and Fixing Time: We strive to respond to vulnerability reports promptly and provide a timeframe for fixing the issue. Our team will work diligently to address the reported vulnerabilities within a reasonable timeframe. We appreciate your patience during the resolution process.

Please note that by participating in our Bug Bounty Program, you agree to abide by the guidelines outlined above. Failure to adhere to these guidelines may result in disqualification from the program and potential legal consequences.

Thank you for helping us enhance the security of ComputerBaba.co.in. We look forward to your valuable contributions and together, we can build a more secure future.


Hall Of Fame – 

  • Ishwar Kumar  (http://www.linkedin.com/in/ishwar-kumar-214341284/)
  • Darshan Jogi   (https://www.linkedin.com/in/darshan-jogi-9450431b6/)


    Happy hunting! The ComputerBaba.co.in Security Team

Image Newletter
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar