• Core Security

    Vulnerability Assessment

    by  • July 31, 2008 • Core Security, Exclusive, Tips and Tricks • 0 Comments

    Basic Terms: Vulnerability: Drawback of a system through which hackers intrude in a network and get space to try attacks on administrators. Vulnerability is also known as Security Hole. Exploit: By taking advantage of the vulnerabilities when the attack is performed is called as exploit of the vulnerability. There can be different exploit for the […]

    Read more →

    Proxies Demystified

    by  • July 30, 2008 • Amol Wagh, Ethical hacking, Exclusive, IP • 0 Comments

    Understanding the concept of proxies first need little introduction about IP Address structure. IP Address: It is assigned when you connect to internet and gives idea about where your locality can be. Means if you perform some attack on private network your geographical location can be traced quickly with the help of your IP. Proxy: […]

    Read more →

    Hiding Your Computer on the Internet

    by  • July 29, 2008 • Amol Wagh, Core Security, Ethical hacking, Network Security, Tips and Tricks, Vista, Windows, XP • 0 Comments

    When you use internet, you are connected to millions of PC’s out there. And each PC have its own unique address known as Static IP Address. This gives your identification by locality. Without a firewall, on a typical computer, even if well maintained, a remote person will still be able to know that the communication […]

    Read more →

    Chunk 1: The Concept of Ethical Hacking

    by  • July 14, 2008 • Core Security, Ethical hacking, Latest News, Nashik Times, Windows • 0 Comments

    Ethical Hacking Series : Chunk 1 Ethical hacking basically means preventing criminal hackers from stealing information of any personal computer r corporate network. Ethical hackers use same technology – software and tool that criminal hackers uses. But they use them for preventing crimes. Penetration testing and vulnerability assessing are the basic types of test ethical […]

    Read more →