Ethical Hacking

How Email Works?

Email sending and receiving is controlled by the Email servers. All Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally. Once the servers are ready to go, users from across the world register in to these Email servers and setup an Email account. When they […]

Top five phase performed by hackers.

Phase I: ReconnaissanceReconnaissance can be described as the pre-attack phase and is a systematic attempt to locate, gather, identify, and record information about the target. The Hacker seeks to find out as much information as possible about the target.Phase II: Scanning and EnumerationScanning and enumeration is considered the second pre-attack phase. This phase involves taking […]

Why Hackers Hack?

The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers — they just hack to see what they can hack and what they can’t hack, usually by testing their own systems. Many Hackers are the guys who get kicked out of corporate and government IT and […]

TYPES OF HACKERS AND WHAT THEY DO ?

Types of Hackers on the basis of activities performed by them. White Hat Hacker:- A White Hat Hacker is computer guy who perform Ethical Hacking. These are usually security professionals with knowledge of hacking and the Hacker toolset and who use this knowledge to locate security weaknesses and implement counter measures in the resources.They are […]

Scroll to top