• About Amol Wagh

    Author is a Tech blogger & loves to share his work on web by writing guidelines for Ethical Hacking students & Security professionals. Performing various types of hacking from pen test to smartphone hacking – He enjoys hacking just for personal research purpose. Working with more of 'grey as well as black hat' hackers for learning advanced hacking as well as defending techniques & share them with learners. His prime area of research is Cyber Criminals & currently working on a Video Product Development to teach hacking & Pen Testing for absolute beginners.

    http://www.hackersenigma.com

    Intrusion Attack Through Port Scanning

    by  • June 16, 2009 • Exclusive, IP, Student Series • 2 Comments

    Port scanning determines which ports are listening to the active connections on the subjected host. These ports represent potential communication channels. With the help of port scanning we get close to the network communication scenario. We get to know more about victim’s network which is useful for further attacks. Internet does not exclusively rely on […]

    Read more →

    Samsung LED Series 6 & 7 For The Perfect Picture

    by  • May 13, 2009 • General • 5 Comments

    Samsung have introduced its amazing new LED technology with the Series 6 & 7 LED TV’s. Samsung have launched these LED TV’s in India differently suiting all the needs of our country’s consumers. Colour, Contrast & Clarity which are the ingredients of this perfect picture television. These crystal designed sets are available as follows: 7 […]

    Read more →

    The Hackers Song

    by  • May 13, 2009 • Ethical hacking • 0 Comments

    You must be amazed to know that hacker’s cult have its own songs. I am presenting here with one of the song I have collected from a old hackers handbook. It is written by hacker, codenamed Nutcracker, which is believed to be an intruder from UK. Song is all the way giving out expressions, joy […]

    Read more →

    Free Calls To Mobiles & Landline Phones Anywhere

    by  • April 17, 2009 • Mobile • 2 Comments

    Now you can make free calls to mobiles & landline through internet from websites enlisted below. Gizmo Call Simply type gizmocall.com/18005551212 into your browsers address bar. (put the number you want to dial in place of 18005551212) Now you can make FREE calls to landline and mobile phones in over 60 countries by participating in […]

    Read more →

    Purpose of Scanning the Network: Stealth Attacks

    by  • April 7, 2009 • Denial of Service, Hosts Scanning, Network Security, Student Series • 0 Comments

    Examine the purpose of network scanning is to gather the information about the victim’s network. Various network mapping tools and techniques are there which an ethical hacker has to go through for performing network scanning. Every cracker (Criminal Hacker) first surely wanted scan any network, and every intelligent one first think about ‘How his attack […]

    Read more →

    Digitalconqurer.com is About to Launch

    by  • April 6, 2009 • Digital Conqurer, General • 0 Comments

    Guess what we have fro you this year … ? Well, we are launching all new website having all technology content named digitalconqurer.com Digital conqurer is a place where we are covering topics like industry news, gadgets, web news,  hardware, cellphones, computers, laptops, telecome sector news and many more. As you all know we are […]

    Read more →

    Host Scanning Methods of Ethical Hackers

    by  • April 5, 2009 • Ethical hacking, Hosts Scanning, Port Scanning, Student Series • 0 Comments

    Introduction After mapping the network topology successfully, next thing to do for ethical hacker is to detect the possible points from which attack can be deployed on host. For this purpose host scanning is done through various methods discussed below. Social engineering It is one of the largest threat to any company’s security as this […]

    Read more →

    Trying To Define ‘Hackers’ (Again)

    by  • April 4, 2009 • Black Hat, Student Series • 0 Comments

    A hacker by definition believes in access to free information. They are usually very intelligent people who could care very little about what you have on your system. Their thrill comes from system infiltration for information reasons. Hackers unlike “crackers and anarchist” know being able to break system security doesn’t make you a hacker any […]

    Read more →