Checking for Live Systems

How do you check for live systems in a targeted environment? There are plenty of ways to accomplish this. Some common ways to perform these types of scans are: ■ Wardialing ■ Wardriving ■ Pinging ■ Port scanning Each of these techniques, along with others we will explore, offers something that the others don’t, or … Read more

The Footprinting Process

There are many steps in the footprinting process, each of which will yield a different type of information. Remember to log each piece of information that you gather no matter how insignificant it may seem at the time. Using Search Engines One of the first steps in the process of footprinting tends to be using … Read more

What Is Footprinting?

Now let’s circle back around to the first step in the process of ethical hacking: footprinting. Footprinting, or reconnaissance, is a method of observing and collecting information about a potential target with the intention of finding a way to attack the target. Foot-printing looks for information and later analyzes it, looking for weaknesses or potential … Read more

what is google dork?

A Google dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website. Google dorking, also known as Google hacking, can return information that is difficult to locate through simple search queries. That description includes information that … Read more

SAFE BROWSING

Internet security is a matter of great concern for internet users. It is important to know if a website is secure or not while surfing the internet 19 . A secure website creates a safe connection between the website and the web browser so that entered data, such as personal information, credit card details, banking … Read more

EMAIL SECURITY TIPS

1. Don’t open email attachments that you are not expecting, or which have come from someone you do not know. When you open such an email, make sure that your anti-virus software is up-to-date and pay close attention to any warnings from your browser or email program. 2. You can use anonymity software which can … Read more

MAJOR ISSUES WITH WLAN

Having said that, WLAN are also as prone to various attacks as their counterpart wired LNAs are. Actually WLANs are easier to hack as compared to wired LANs, if not properly configured, due to its easy accessibility around the installation. No need to be in contact of physical wires to hack can be done from … Read more

WHAT IS WIRELESS LAN?

The Wireless LAN or WLAN is becoming a popular way to connect devices such as computers these days. In offices and homes, WLAN has become an alternative way of communication compared to wired LAN. The convenience to connect different devices is both cost effective and easily maintainable. The Wikipedia says: “Wireless LANs have become popular … Read more

SOME CYBER CRIME INCIDENTS

In the current section, we will discuss some of the common cyber crimes and fruads incidents over internet so that you could appriciate how these little ignorance could lead to a big digaster. 1. Paypal, an international online money transfer service, which allows you to safely transfer money through an Internet using various encryption techniques … Read more