Posts

Showing posts from December, 2016

What is Virtual Private Network (VPN) ?

Image
What is a Virtual Private Network (VPN)? A VPN or Virtual Private Network is a network connection that enables you to create a secure connection over the public Internet to private networks at a remote location. With a VPN, all network traffic (data, voice, and video) goes through a secure virtual tunnel between the host device (client) and the VPN provider’s servers, and is encrypted. VPN technology uses a combination of features such as encryption, tunneling protocols, data encapsulation, and certified connections to provide you with a secure connection to private networks and to protect your identity. VPN connections technically give you all the benefits of a Local Area Network (LAN), which is similar to that found in many offices but without requiring a hard-wired connection. Early VPNs were often set up to give individual employees secure remote access to their company networks, hence the name “virtual private network”. By connecting to the company’s netwo...

Virus.

Image
Computer Virus Information.   What is a computer virus? Think of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps you from functioning normally and often requires something powerful to get rid of it. A computer virus is very similar. Designed to relentlessly replicate, computer viruses infect your programs and files, alter the way your computer operates or stop it from working altogether. It’s estimated that the Conficker virus infected more than 10 million computers in 2009. Tens of thousands of computer viruses now operate over the Internet, and new computer viruses are discovered every day. How does a computer virus find me? Even if you’re careful you can pick up computer viruses through normal Web activities like: Sharing music, files or photos with other users Visiting an infected Web site Opening spam email or an email attachment Downloading free games, toolbars, media players and other system utilities Install...

Download Youtube Videos Without Software.

Image

Top Five Hackers of all time.

Image
     _____________Hackers__________________ That’s right. The term “hacker” originally referred to the second type, which held absolutely no malevolent connotations. Only recently has the term been used to refer primarily to criminal masterminds. There are good hackers and bad hackers. Nowadays, benevolent hackers are often called “white hats” while the more sinister are called “black hats.” Jonathan James:- Jonathan James was known as “c0mrade” on the Internet. What is his ticket to fame? He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S. Department of Defense, and NASA. Yes, James hacked into NASA’s network and downloaded enough source code to learn how the International Space Station worked. The total value of the downloaded assets equaled $1.7 million. To add ins...

Types of Hackers

Image
                        HACKERS TYPES 1. White hat hacker 2. Gray hat hacker 3. Black hat hacker White Hat and Grey Hat Hacker & What is the Real Difference? What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker. However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people. So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts. What Is A White Hat Hacker? A hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of mone...

Top Computer Viruses of All Time.

Image
1.  Melissa            A macro virus named after a Miami stripper, was so effective in 1999 that the tidal wave of email traffic it generated caused the likes of Intel and Microsoft to shut down their email servers. The virus contained a Word document labeled List.DOC as an attachment to an email allowing access to porn sites. The email was first distributed to a Usenet group but quickly got out of hand. When a user opened the email a message, the infected Word attachment was sent to the first 50 names in the user's address book. The scheme was particularly successful because the email bore the name of someone the recipient knew and referenced a document they had allegedly requested. I recall spending long hours cleaning up after this one. 2.  The Anna Kournikova Virus This computer virus was attributed to a Dutch programmer Jan de Wit on February 11, 2001. The virus was designed to trick a recipient into opening a message by sug...

Hackers VS Crackers

Image
Hackers   VS   Crackers :-                             A Cracker is a person who breaks in to a security system only with a malicious intent. A person who breaks in to a computer system for the purpose of earning profit, finding security loopholes of the system, showing protest or just for the sake of challenge is called a hacker. In recent times the differentiation between the definitions of the two terms has become vague due to the misuse of them by the mass media and the existence of the people belonging to both categories. W hat is a Hacker? A person who breaks in to a computer system for the purpose of finding security loopholes, earning profit, showing protest or just for the sake of challenge is called a hacker. This is the meaning of hacker, which comes up in the computer security. There are several types of hackers identified as white hat hackers, black hat hacker, grey hat hacker, el...