Thursday , 4 June 2020

Managing Spam to Avoid Viruses

Managing Spam to Avoid Viruses

Managing Spam to Avoid Viruses: Although spam is not truly a virus or a hoax, it is one of the most annoying things with which an administrator must contend. Spam is defined as any unwanted, unsolicited email, and not only can the sheer volume of it be irritating, but it can also often open the door to larger problems. For …

Read More »

How Viruses Work

How Viruses Work

How Viruses Work: A virus, in most cases, tries to accomplish one of two things: render your system inoperable or spread to other systems. Many viruses will spread to other systems given the chance and then render your system unusable. This is common with many of the newer viruses. If your system is infected, the virus may try to attack …

Read More »

Social Networking and Information Gathering

Social Networking and Information Gathering

Social Networking and Information Gathering: One of the best sources for information is social networking. Social networking has proven not only extremely prolific but also incredibly useful as an information-gathering tool. A large number of people who use these services provide updates on a daily basis. You can learn not only what an individual is doing but also all the …

Read More »

Finding the IP address of a Website

Finding the IP address of a Website

Finding the IP Address of a Website: This exercise will show you how to obtain the information about a website by using the ping and tracert.   On a Windows system, open the command prompt and enter the following command: ping jahasoft.com   Note the IP address that is returned, along with any other statistics such as packets lost and …

Read More »

Intrusion Prevention and Intrusion Detection Systems

Intrusion Prevention and Intrusion Detection Systems

Intrusion prevention & Intrusion detection systems: Intrusion prevention system (IPSs) and intrusion detection systems (IDSs) are important considerations for any smart hacker. It is important for you, as a hacker, to cover your tracks and keep a low profits—as in no profit at all. It should be common sense, but consider this: if instead of tiptoeing around a network, you …

Read More »

Hacking: Generic Example of Cyber Crime

Hacking: Generic Example of Cyber Crime

Generic Examples of Cyber Crime: Hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. For only a portion of the time since then has hacking been viewed as a crime and a situation that needs to be addressed.   Here are some generic examples of cyber Crime:   Stealing passwords …

Read More »

Hacking: Fun or Criminal Activity?

Hacking: Fun or Criminal Activity?

Hacking Fun or Criminal Activity: As stated earlier, hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. For only a portion of the time since then has hacking been viewed as a crime and a situation that needs to be addressed.   Here’s a look at some famous hacks over …

Read More »

Code of Conduct and Ethics

Code of Conduct and Ethics

Code of Conduct and Ethics: As an ethical hacker you will need to make sure that you adhere to a code of conduct or ethics to ensure you remain trustworthy (and employed). In the case of EC-Council’s CEH credential you are expected to adhere to their Code of Ethics in your dealings lest you be decertified. In order to make …

Read More »

The Evolution and Growth of Hacking

The Evolution and Growth of Hacking

The Evolution and Growth of Hacking: As you will see that attacks and strategies have improved and evolved over the years in ways you may not be aware of. Attackers have constantly sought up their game with new tactics and strategies to include various types of malware such as worms, spam, spyware, adware, and even rootkits. Although they have long …

Read More »

Protecting Cookies

Protecting Cookies

Protecting Cookies: Since cookies are an integral part of the web applications, it is important to understand the methods that can be used to secure them properly. While the developers of an application is ultimately he only person who can make changes to secure cookies in most cases, it is important to understand what they can do. Earlier in Articles …

Read More »