Wednesday , August 22 2018

February, 2018

  • 2 February

    Intrusion Prevention and Intrusion Detection Systems

    Intrusion Prevention and Intrusion Detection Systems

    Intrusion prevention & Intrusion detection systems: Intrusion prevention system (IPSs) and intrusion detection systems (IDSs) are important considerations for any smart hacker. It is important for you, as a hacker, to cover your tracks and keep a low profits—as in no profit at all. It should be common sense, but …

  • 1 February

    Hacking: Generic Example of Cyber Crime

    Hacking: Generic Example of Cyber Crime

    Generic Examples of Cyber Crime: Hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. For only a portion of the time since then has hacking been viewed as a crime and a situation that needs to be addressed.   Here …

January, 2018

  • 31 January

    Hacking: Fun or Criminal Activity?

    Hacking: Fun or Criminal Activity?

    Hacking Fun or Criminal Activity: As stated earlier, hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. For only a portion of the time since then has hacking been viewed as a crime and a situation that needs to be …

  • 30 January

    Code of Conduct and Ethics

    Code of Conduct and Ethics

    Code of Conduct and Ethics: As an ethical hacker you will need to make sure that you adhere to a code of conduct or ethics to ensure you remain trustworthy (and employed). In the case of EC-Council’s CEH credential you are expected to adhere to their Code of Ethics in …

  • 29 January

    The Evolution and Growth of Hacking

    The Evolution and Growth of Hacking

    The Evolution and Growth of Hacking: As you will see that attacks and strategies have improved and evolved over the years in ways you may not be aware of. Attackers have constantly sought up their game with new tactics and strategies to include various types of malware such as worms, …

  • 28 January

    Protecting Cookies

    Protecting Cookies

    Protecting Cookies: Since cookies are an integral part of the web applications, it is important to understand the methods that can be used to secure them properly. While the developers of an application is ultimately he only person who can make changes to secure cookies in most cases, it is …

  • 27 January

    Safety Topics

    Safety Topics

    Safety Topics: Security is a priority for every administrator, but it cannot be the only priority: security cannot forsake all others. One of the other priorities that CompTIA wants you to be familiar with for this exam is safety. Most of the topics that fall beneath their definition of safety …

  • 26 January

    Penetration Testing

    Penetration Testing

    Penetration Testing: It is becoming more common for companies to hire penetration testers to test their system’s defense. Essentially, a penetration tester will use the same techniques a hacker would use to find any flaws in your system’s security.   NOTE: Hacking and penetration testing are areas that seem quite …

  • 24 January

    Security and the Cloud

    Security and the Cloud

    Security and the cloud: Since this is a certification exam on security and not just on memorization of cloud-based terminology, it is important to recognize the security issues associated with cloud computing. Two you should know for the exam are multitenancy and laws and regulations:   Multitenancy: One of the …

  • 23 January

    Databases and Technology

    Databases and Technology

    Databases & Technology: One key reason why computers are installed is for their ability to store, access, and modify data. The primary tool for data management is the database. Databases have become increasingly sophisticated, and their capabilities have grown dramatically over the last 10 years. This growth has created opportunities …