Welcome! Log In Create A New Profile

Advanced

TASK 6A-1

Posted by TKalebka 
Announcements Last Post
Announcement SoC Curricula 09/30/2017 01:08PM
Announcement Demarcation or scoping of examinations and assessment 02/13/2017 07:59AM
Announcement School of Computing Short Learning Programmes 11/24/2014 08:37AM
Announcement Unisa contact information 07/28/2011 01:28PM
TASK 6A-1
July 21, 2008 08:31PM
http://www.catb.org/~esr/faqs/hacker-howto.html
http://www.thenetworkadministrator.com/2003MostPopularHackingTools.htm
http://www.governmentsecurity.org/articles/HowtobecomeamasterHacker.php http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/WirelessHacks/Mateti-WirelessHacks.htm
http://ist.psu.edu/s2/paper/hack-wired-network-may-04.pdf

Here are some sites off tools and teaching material for different techniques in hacking.

Popular hacking techniques that are mentioned where ever I’ve searched are:

•Spoofing (tricking user to visit hackers site and entering some personal data),
•Sniffing (sniffing through network traffic emerging from users computer
obtaining list of passwords and logins),
•Using password-cracking tools (for decrypting encrypted password).

To prevent majority of attacks is always having a recognized antivirus software, consisting of firewalls and antispyware.
Another great idea to further improve you security is to have a router that has a built in firewall, that you can filter access to the internet to you specifications.

I suppose there are advantages and disadvantages to this information being freely available on the internet.

Advantage:
Allows everybody connected to the internet to be aware and to educate themselves about the harmful exposure they are susceptible to. Network Admins use this information to keep up to date, and to prevent attacks before they occur.

Disadvantage:
Due to this information being freely available, it allows anyone to freely learn and use these tools and techniques against whomever they please.


Administrators should constantly monitor hacker sites, so that they are aware of different kinds of attacks and tools used to access and disrupt the networks they are controlling.
Sorry, only registered users may post in this forum.

Click here to login