•Techniques: Windows Hacking, Registries Editing, Password cracks, Google hacking, Computer Forensics, Firewalls, Network Hacking, Security tools, Hacking tools, Encryption, Email tracking, Router Hacking, Email Forging, Port Scanning, MAC Address Spoofing, Proxies etc.
•Tools: Key loggers, Anti Key Loggers, Firewalls, MAC Address Spoofing, Proxy Bouncing tools, Network Scanners like IPscan, Sniffers, Spyware and Trojan Detectors, Information Gathering Tools, Remote Administration Tools, Computer Forensics Tools, Steganography tools and a lot more.
•Games: Hacking Simulation Games to understand the world of hacking and provides you with the opportunity to practice hacking without the danger of getting caught
10 Commandments of Ethical Hacking
1. Don’t a computer to harm other people.
2. Don’t interfere with other people’s computer work.
3. Don’t snoop around in other people’s computer files.
4. Don’t use a computer to steal.
5. Don’t use a computer to bear false witness.
6. Don’t copy or use proprietary software for which you have not paid.
7. Don’t use other people’s computer resources without authorization or compensation.
8. Don’t appropriate other people’s intellectual output.
9. Think about the social consequences of the program you are writing.
10. Always use a computer in ways that insure consideration and respect for your fellow humans.
0 comments:
Post a Comment