US-China tensions overshadow closing of Oracle-ByteDance deal

Demands from President Donald Trump that TikTok must be quickly sold to a US company or face a nationwide ban sparked frantic talks between TikTok parent company ByteDance and US companies, including Microsoft, Twitter, Walmart and Oracle. These talks have been disrupted by complications, including Trump’s insistence that the US government should receive a financial “cut” of … Read more

pen test logic

A pen test is the next logical step beyond ethical hacking. Although ethical hacking sometimes occurs without a formal set of rules of engagement, pen testing does require rules to be agreed on in advance in every case. If you choose to perform a pen test without having certain parameters determined ahead of time, it … Read more

Installing Apache Cassandra on CentOS 7

Prerequisites The user you are logged in as must have sudo privileges to be able to install packages. Installing Apache Cassandra The recommended way to install Apache Cassandra on CentOS 7 is by installing the rpm package from the official Apache Cassandra repository. To install OpenJDK , on your system type: $ sudo yum install java-1.8.0-openjdk-devel Verify the Java installation by … Read more

As an ethical hacker you must agree to the some code of ethics

Keep private and confidential information gained in your professional work (in particular as it pertains to client lists and client personal information). Do not collect, give, sell, or transfer any personal information (such as name, e-mail address, social security number, or other unique identifier) to a third party without prior client consent. Protect the intellectual … Read more

Ethical Hacking and Penetration Testing

Ethical hackers engage in sanctioned hacking—that is, hacking with permission from the system’s owner. In the world of ethical hacking, most tend to use the term pen tester, which is short for penetration tester. Pen testers do simply that: penetrate systems like a hacker, but for benign purposes. As an ethical hacker and future test … Read more

Bad Guys and Good Guys or Hackers and Ethical Hackers

how to prevent hacking in linux

The difference between an ethical hacker and a hacker is something that can easily get you into an argument. Just saying the word hacker in the wrong place can get you into an hours-long conversation of the history of hacking and how hackers are all good guys who mean nothing but the best for the … Read more

The Evolution and Growth of Hacking

Attackers have constantly sought to “up” their game with new tactics and strategies to include new types of malware such as worms, spam, spyware, adware, and even rootkits. Although they already knew how to harass and irritate the public, in recent years they have caused ever bolder disruptions of today’s world by preying on our … Read more

Current Developments in Hacking

In the early 2000s, more malicious activity started to appear in the form of more advanced attacks. In fact, in the first few years of the new millennium the aggressiveness of attacks increased, with many attacks criminally motivated. Malicious attacks that have occurred include the following, among many more: ■ Denial-of-service attacks ■ Manipulation of … Read more

The Early Days of Hacking

As the story goes, the earliest hackers were a group of people who were passionate and curious about new technology. They were the equivalent of those modern-day individuals who not only want the latest technology, such as a smartphone or iPhone, but also want to learn all the juicy details about what the device does … Read more