Auditing And Monitoring

In recent years, the development and use of computer has increase rapidly with the increase in keeping the accounting records & producing financial information. This brings a change in the way an organization store & process information. Auditing In the field of Information Technology, auditing means the examination & evaluation of IT infrastructure, its policies, […]
    Read More

    Intrusion Prevention System (IPS)

    It is an approach to network security to detect potential threats & respond to them tactfully. These network security appliances monitor network and system to detect any malicious or illicit activity. Stepwise working procedures of IPS are: 1st, detect malicious threat or activity Then log information about that activity Take attempt to stop or block […]
      Read More

      Intrusion Detection System (IDS)

      In the modern era of technology, hacking and cyber-crime has become common and on a daily basis more than tens of thousands of computers, network devices and mobile phones are being hacked by malicious users. So, security has become a prime matter of concern. So organizations can use IDS & IPS for their security. Let’s […]
        Read More

        Google Dorks

        It s important to be noted that Google plays a very important part in hacking and gathering information or used by ethical & non-ethical hackers to search for a specific data. Google search box made it easy for hackers and security professionals to search specific topic or thing by using some special operators along with […]
          Read More

          Safety And Anonymity

          Today, most of the computer users have the knowledge of using Internet, which is the global interconnection of computers that uses internet protocol suite such as TCP/IP protocols to connect billions of devices world-wide. These users share information, chat online, listens to songs, download files etc. But these users are not aware of the fact […]
            Read More

            Darknet

            In today’s world Internet has become the most indispensable part of human life which connects the entire globe. But there is some mysterious hidden internet area which many people don’t familiar with! That is called the “Deep Web” or the “Darknet” that users can’t normally find using normal or manual search & is stay hidden […]
              Read More

              Denial of Service (DoS)

              Hackers have numbers of reason to break through network security. Whatever the reason is; hacking causes damage both to that particular individual who becomes the prey along with the computing devices & lays a greater impact on business firms resulting in the loss of millions of dollars. A hacker also has the technique that they […]
                Read More

                Botnets

                As we are familiar with computer viruses and how it internally works, we will be going into little in-depth about what botnets are and how they works; what are their types and where these terms are used by hackers. Defining Botnets The term botnet is not a malicious one. Botnet is the short form of […]
                  Read More

                  Rootkits

                  As we are familiar with computer viruses and how it internally works, we will be going into little in-depth about what botnets & rootkits are and how they works; what are their types and where these terms are used by hackers. First of all we will be dealing with Rootkits. Defining Rootkits Rootkits are the […]
                    Read More
                    computer virus

                    Computer Virus

                    Almost every successful hacker needs malicious codes or programs to deal with illicit tasks & programs. Almost everyone who uses computer and internet are familiar with the term Virus. Its abbreviation is: Vital Information Resource Under Seize. Many viruses can be stopped before they get triggered if users properly maintain safety options. But there are […]
                      Read More
                      Page 1 of 1612345678...Last »