February, 2018

  • 10 February

    Cookies and Attachments

    Cookies and Attachments

    Cookies and Attachments: Cookies are texts files that a browser maintains on the user’s hard disk in order to provide a persistent, customized web experience for each visit. A cookie typically contains information about the user. For example, a cookie can contain a client’s history to improve customer services. If …

  • 9 February

    ACL: Access Control Lists

    Access Control Lists

    Access Control Lists: Related to permissions is the concept of the access control lists (ACL). An ACL is literally a list of who can access what resource and at what level. It can be an internal part of an operating system or application. For example, a custom application might have …

  • 8 February

    Malicious Insider Threats

    Malicious Insider Threats

    Malicious Insider Threats: One of the most dangerous threats to any network is an insider who is intent on doing harm. By being an insider, they have already gotten past your first defense and they might be motivated by a desire to make someone pay for passing them over for …

  • 7 February

    Managing Spam to Avoid Viruses

    Managing Spam to Avoid Viruses

    Managing Spam to Avoid Viruses: Although spam is not truly a virus or a hoax, it is one of the most annoying things with which an administrator must contend. Spam is defined as any unwanted, unsolicited email, and not only can the sheer volume of it be irritating, but it …

  • 6 February

    How Viruses Work

    How Viruses Work

    How Viruses Work: A virus, in most cases, tries to accomplish one of two things: render your system inoperable or spread to other systems. Many viruses will spread to other systems given the chance and then render your system unusable. This is common with many of the newer viruses. If …

  • 5 February

    Social Networking and Information Gathering

    Social Networking and Information Gathering

    Social Networking and Information Gathering: One of the best sources for information is social networking. Social networking has proven not only extremely prolific but also incredibly useful as an information-gathering tool. A large number of people who use these services provide updates on a daily basis. You can learn not …

  • 4 February

    Finding the IP address of a Website

    Finding the IP address of a Website

    Finding the IP Address of a Website: This exercise will show you how to obtain the information about a website by using the ping and tracert.   On a Windows system, open the command prompt and enter the following command: ping jahasoft.com   Note the IP address that is returned, …

  • 2 February

    Intrusion Prevention and Intrusion Detection Systems

    Intrusion Prevention and Intrusion Detection Systems

    Intrusion prevention & Intrusion detection systems: Intrusion prevention system (IPSs) and intrusion detection systems (IDSs) are important considerations for any smart hacker. It is important for you, as a hacker, to cover your tracks and keep a low profits—as in no profit at all. It should be common sense, but …

  • 1 February

    Hacking: Generic Example of Cyber Crime

    Hacking: Generic Example of Cyber Crime

    Generic Examples of Cyber Crime: Hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. For only a portion of the time since then has hacking been viewed as a crime and a situation that needs to be addressed.   Here …

January, 2018

  • 31 January

    Hacking: Fun or Criminal Activity?

    Hacking: Fun or Criminal Activity?

    Hacking Fun or Criminal Activity: As stated earlier, hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. For only a portion of the time since then has hacking been viewed as a crime and a situation that needs to be …