The Early Days of Hacking

As the story goes, the earliest hackers were a group of people who were passionate and curious about new technology. They were the equivalent of those modern-day individuals who not only want the latest technology, such as a smartphone or iPhone, but also want to learn all the juicy details about what the device does … Read more

WAYS TO PROTECT CYBER TERRORISM

“SOME WAYS TO PROTECT CYBER TERRORISM” Employ Strong Passwords: As simple as this sound, it is one of the most overlooked methods of keeping systems safe. There are a number of freely available tools that ‘guess’ passwords — a very common technique referred to as ‘brute force cracking. These programs work by repeatedly attempting to … Read more

PROTECTION FROM CYBER TERRORISM

PROTECTION FROM CYBER TERRORISM- A FEW SUGGESTIONS Currently there are no foolproof ways to protect a system. The completely secure system can never be accessed by anyone. Most of the militaries classified information is kept on machines with no outside connection, as a form of prevention of cyber terrorism. Apart from such isolation, the most … Read more