• Home
  • Advertise
  • Disclaimer
Hackers Enigma
  • Home
  • Business Security
  • Cyber Security
  • Network Security
  • Ethical hacking
  • Blockchain
  • IT Security
  • Cryptocurrency
  • AI & Machine Learning

Vulnerability Assessment

Vulnerability Assessment

July 31, 2008 No Comments

Basic Terms: Vulnerability: Drawback of a system through which hackers intrude in a network and get space to try attacks on administrators. Vulnerability is also known as Security Hole. Exploit: By taking advantage of the vulnerabilities when the attack is performed is called as exploit of the vulnerability. There can

Proxies Demystified

July 30, 2008 No Comments

Understanding the concept of proxies first need little introduction about IP Address structure. IP Address: It is assigned when you connect to internet and gives idea about where your locality can be. Means if you perform some attack on private network your geographical location can be traced quickly with the

Hiding Your Computer on the Internet

July 29, 2008 No Comments

When you use internet, you are connected to millions of PC’s out there. And each PC have its own unique address known as Static IP Address. This gives your identification by locality. Without a firewall, on a typical computer, even if well maintained, a remote person will still be able

How to Block Pop-Ups and Banner Ads

July 29, 2008 No Comments

  Follow The steps to block Pop up banners by changing settings in Internet Explorer.   1) Go to TOOLS and then INTERNET OPTIONS.   2) Click the SECURITY tab, move the slider up to HIGH and click APPLY.   This applies the highest security settings to IE, which blocks

How To Convert File System,FAT – FAT32 to NTFS

July 27, 2008 No Comments

Open a dos prompt and type the command   convert d: /fs:NTFS   This command would convert your d: drive to NTFS   If the system cannot lock the drive, you will be prompted to convert it during next reboot.   Normally you should select yes.   Conversion from fat/fat32

How to Change IP Address Quickly

July 26, 2008 No Comments

1. Click on “Start” in the bottom left hand corner of screen 2. Click on “Run” 3. Type in “command” and hit ok You should now be at an MSDOS prompt screen. 4. Type “ipconfig /release” just like that, and hit “enter” 5. Type “exit” and leave the prompt 6.

COMPAQ DRIVERS FOR V3424AU

July 25, 2008 No Comments

Dear friends finding problem for Compaq drivers please click the link below http://h10025.www1.hp.com/ewfrf/wc/softwareList?os=228&lc=en&cc=in&dlc=en&product=3446906&lang=en.

WHEN APPLICATION PROMPTS OPEN WITH….

July 25, 2008 No Comments

Dear friends, Sometimes you face a problem regarding opening of applications.They are drives or .exe files but still they prompt us to open with.The main cause to this problem is that your application is infected with a virus AUTORUN.INF.This virus can be deleted manually by exploring the application.The other solution

POWER SAVER TIPS FOR LAPTOP

July 19, 2008 No Comments

a)Keep the wireless LAN when not required. b)Charge the laptop battery only when completely drained. c)Please keep the laptop on the minimal power management option from the following path:Start->Control panel->Power options->minimal battery battery mode. d)Defragement your hard drive regularly. e)If you have a graphics card but rarely use it then

Chunk 1: The Concept of Ethical Hacking

July 14, 2008 No Comments

Ethical Hacking Series : Chunk 1 Ethical hacking basically means preventing criminal hackers from stealing information of any personal computer r corporate network. Ethical hackers use same technology – software and tool that criminal hackers uses. But they use them for preventing crimes. Penetration testing and vulnerability assessing are the

AI & Machine Learning

  • Cortexica Delivers ‘Machine Learning Models-as-a-Service’ on AWS Marketplace for Machine Learning

    November 30, 2018

  • AMAX Launches World’s First QLC-Based NFS Storage Solution for Deep Learning

    November 27, 2018

  • causaLens Appoints Hedge Fund Veteran and Data Leaders to Advisory Board

    November 27, 2018

  • Innova Research Won Consulting Project to Prompt the Adoption of AI Technologies in Manufacturing

    November 21, 2018

  • Aquant’s AI Platform Used by Compact Power Equipment to Modernize Service Operations

    November 13, 2018

Network Security

  • The Importance Of Using A Vulnerability Scanner For Security

    The Importance Of Using A Vulnerability Scanner For Security

    June 1, 2019

  • Finance is The Most Attacked Sector in Past 7 Years

    Finance is The Most Attacked Sector in Past 7 Years

    April 17, 2019

  • Malware Can Spread Through Software Updates

    Malware Can Spread Through Software Updates

    August 2, 2016

  • Unobtrusive Mapping of Network

    Unobtrusive Mapping of Network

    June 20, 2009

  • Purpose of Scanning the Network: Stealth Attacks

    Purpose of Scanning the Network: Stealth Attacks

    April 7, 2009

AI & Machine Learning

  • Cortexica Delivers ‘Machine Learning Models-as-a-Service’ on AWS Marketplace for Machine Learning

    November 30, 2018

  • AMAX Launches World’s First QLC-Based NFS Storage Solution for Deep Learning

    November 27, 2018

  • causaLens Appoints Hedge Fund Veteran and Data Leaders to Advisory Board

    November 27, 2018

  • Innova Research Won Consulting Project to Prompt the Adoption of AI Technologies in Manufacturing

    November 21, 2018

  • Aquant’s AI Platform Used by Compact Power Equipment to Modernize Service Operations

    November 13, 2018

Cyber Security

  • 8 Quick Tips To Stay Secure While Gaming Online

    April 2, 2019

  • SecureTheVillage Awarded “Certificate of Recognition” by Los Angeles Mayor Eric Garcetti at Annual Cybersecure LA Conference

    November 28, 2018

  • Itero Group, LLC Secures Five Thousand Square Feet for Company Expansion

    November 27, 2018

  • Habitu8 Partners with International Association of Security Awareness Professionals

    November 7, 2018

  • Cympire Executes Cyber Challenges with Bar Ilan University

    November 6, 2018

Business Security

  • Web Security Can Help Boost Online Retail Sales Beyond Black Friday

    March 7, 2019

  • PureVPN Takes Black Friday VPN Discount to a Whole New Level

    November 26, 2018

  • Living Security Raises $1.25M to Bring Security Awareness Training to the Enterprise

    November 21, 2018

  • Neurotags, Inc. Brings the World’s Most Powerful Anti-Counterfeiting Technology to North America.

    November 14, 2018

  • LogPoint Strengthens Channel and Engineering Teams With New Leadership for the Americas

    November 14, 2018

Popular Posts

  • CUJO AI’s Einaras von Gravrock Describes Bringing a Multi-solution, AI-driven Software and Security Platform to NSPs Via Technicolor’s HERO Program

    CUJO AI’s Einaras von Gravrock Describes Bringing a Multi-solution, AI-driven Software and Security Platform to NSPs Via Technicolor’s HERO Program

    November 5, 2018

  • SimplyVital Health Secures Contract with the Bone & Joint Institute at Hartford Hospital

    SimplyVital Health Secures Contract with the Bone & Joint Institute at Hartford Hospital

    July 6, 2018

  • The Importance Of Using A Vulnerability Scanner For Security

    The Importance Of Using A Vulnerability Scanner For Security

    June 1, 2019

  • Noah Project unveils its Noah Wallet to the public

    Noah Project unveils its Noah Wallet to the public

    July 7, 2018

© Copyright 2023. All rights reserved.
Theme made by Different Themes