DoS Denial of Service Attack

DoS – Denial of Service Attack What is DoS Attack? DOS is an attack used to deny legitimate users access to a resource such as accessing a website, network, emails, etc., or making it extremely slow. DoS is the acronym for Denial of Service. This type of attack is usually implemented by hitting the target resource such as … Read more

How to Hack WiFi Password

How to Hack WiFi Password Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc. Here, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some … Read more

What is ARP Poisoning

What is ARP Poisoning ARP is the acronym for Address Resolution Protocol. It is used to convert an IP address to physical addresses [MAC address] on a switch. The host sends an ARP broadcast on the network, and the recipient computer responds with its physical address [MAC Address]. The resolved IP/MAC address is then used … Read more

What is IP Address and MAC Address

What is IP Address and MAC Address IP Address IP Address is the acronym for Internet Protocol address. An internet protocol address is used to uniquely identify a computer or device such as printers, storage disks on a computer network. There are currently two versions of IP addresses. IPv4 uses 32-bit numbers. Due to the … Read more

Ethical Hacking: Worm, Virus & Trojan Horse

Ethical Hacking: Worm, Virus & Trojan Horse Some of the skills that hackers have are programming and computer networking skills. They often use these skills to gain access to systems. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer-controlled equipment. Some of the ways that … Read more

How to Crack a Password

How to Crack a Password What is Password Cracking? Password cracking is the process of attempting to gain unauthorized access to restricted systems using common passwords or algorithms that guess passwords. In other words, it’s the art of obtaining the correct password that gives access to a system protected by an authentication method. Password cracking … Read more

Cryptography: What is Cryptanalysis, RC4 and CrypTool

Cryptography: What is Cryptanalysis, RC4 and CrypTool Information plays a vital role in the running of businesses, organizations, military operations, etc. Information in the wrong hands can lead to loss of business or catastrophic results. To secure communication, a business can use cryptology to cipher information. Cryptology involves transforming information into the Nonhuman readable format … Read more

Social Engineering : Attacks, Techniques & Prevention

Social Engineering: Attacks, Techniques & Prevention Social engineering is the art of exploiting the human elements to gain access to un-authorized resources. Social engineers use a number of techniques to fool the users into revealing sensitive information. Organizations must have security policies that have social engineering countermeasures. What is Social Engineering? Social engineering is the … Read more

Programming languages that are useful to hackers

Programming languages that are useful to hackers Why should hackers learn how to program? Hackers are problem solvers and tool builders, learning how to program will help you implement solutions to problems. It also differentiates you from script kiddies. Writing programs as a hacker will help you to automate many tasks which would usually take lots … Read more

Potential Security Threats To Your Computer Systems

Potential Security Threats To Your Computer Systems Knowing how to identify computer security threats is the first step in protecting computer systems. The threats could be intentional, accidental, or caused by natural disasters. In this article, we will introduce you to the common computer system threats and how you can protect systems against them. A … Read more