Category: ethical hacking
-
Top 10 White Hat Hackers
White hat hackers are known to be very helpful when it comes to finding a huge range of problems with computer systems. They also do all they can in order to fix any of those issues the best way they can. With that in mind, we created a list to include some of the best…
-
Port scanning or OS fingerprinting
Believe it or not! The fact is pretty obvious that footprinting is essential to any successful attack. By and large, 70% of any attack should be spent gathering precise footprinting. In doing so, an attacker presumably knows operating system, open ports and any services running on those open ports as well as any vulnerable applications…
-
Big Brother is watching WhatsApp
Is China the Big Brother that watch over its citizens from the harmful contents of social network? The question arose once again after the country decided to block WhatsApp mobile messaging application on its border. To be fair, WhatsApp was blocked twice, first in July this year by crippling its media sharing capability. Then by…
-
Fundamentals of Ethical Hacking
Footprinting is understood as information gathering and very first step in any cyber-attack on information systems. It is somewhat crucial for the attackers streamline a scope of his work and help him select the tools being used. There is a famous Chinese general Sun Tzu saying about planning, attacking and winning several battles as “If…
-
Big Four, Deloitte hacked and who’s next?
In a giant-slaying act, the world’s leading accounting firm, Deloitte got hacked and sent shockwave to the rest of the “Big Four†global accounting firms on who’s next on the hit list. The attack on accounting giant occurred on Monday, and the details remained sketchy as investigators piece the information together in crime scene investigation…
-
Ransomware is the biggest story in Computer Hacking today
Unfortunately, it doesn’t seem like there is an end in sight. As matter of fact, the hacks seem to be getting more and more sophisticated as the days go by. As long as the reasons for the hacking continues to exist there is no reason to believe that it will end. The reasons for hacking…
-
Rearming for Cyber-warfare
War costs moneys and it is no brainers that the wealthy state with a bigger economy can always awash weapons of mass destruction at a moment notice to turn the tide of war. In cybersecurity or rather cyber-warfare, funds are needed to upgrade hardware, technology and communications before assembling trained men dedicated to defend or…
-
Pen Testing Tools The Pros Use
Pen Testing Tools The Pros Use. What is pen testing? Penetration testing is a test performed by professional hackers to determine if a system is vulnerable to attack – before the attackers do. In other words if the tested systems defenses were enough and which defenses the test overcome. Majority of professional hackers will use…
-
How To Turn On Internal Mobile Hotspot for Windows 10?
One of them being the ability to create a Wi-Fi hotspot. The great benefit here is that you can do that if you have the OS installed and a bit of knowledge about how to complete the process. It really goes to show that the value you can receive this way will be downright astonishing.…
-
How can you permanently delete files without sending them to the recycle bin?
If you are a Windows user, chances are that you always have to deal with lots of files that you want to delete from your computer. T he downside is that you always have to go to the recycle bin and remove them again, even if you already deleted them once. This can be a…