Posts

Showing posts with the label Tips

6 Ways To Protect Your Data From Hackers - 2016 (Updated)

Image
6 Ways To Protect Your Data From Hackers - 2016 (Updated) The year 2016, is turning out to be the year of data breaches. Hackers have become particularly active and just today, we are hearing about two big data breaches: Millions of Gmail IDs and password almost went on sale and there is a suspect data breach in the IRCTC website that is used by crores of Indians. With hackers on the march, how can you be safe? If you think who would want to hack my account and steal my data, you couldn't be more wrong. According to a recent report, a hacker was sitting over 272 million email accounts and passwords, and he was ready to trade them, wait, not for money, but just for a good name in hacker forums. Any inconspicuous user could be a target. You as well. Unfortunately, most people keep only one password for different accounts, for example, same password for Gmail, Facebook, Twitter, or even online banking. Even a simple brute force attack can reve...

13 Best Tools For Hacking Wireless Networks

Image
13 Best Tools For Hacking Wireless Networks Wireless networks are based on IEEE 802.11 standards defined by IEEE(Institute of Electrical and Electronics Engineers) for ad hoc networks or infrastructure networks. Infrastructure networks have one or more access points which coordinate the traffic between the nodes. But in ad hoc networks, there is no access point; each node connects in a peer-to-peer way. Basically there are two types of vulnerabilities which can be found in the Wireless LAN. One is poor configuration and the other is poor encryption. Poor configuration is caused by the network admin who manages the network. It may include the weak password, no security settings, use of default configurations, and other user related things. Poor encryption is related to security keys used to protect the wireless network. It is there because of issues in WEP or WPA. WEP and WPA WEP and WPA are the two main security protocols used in Wi-Fi LAN. WEP is known as Wired Equivale...

Top 6 Password Cracking Techniques

Image
Top 6 Password Cracking Techniques Well I guess you allfind the 6 best password cracking techniques. Putting up a good and long password is advised by cyber security however cyber security does n’t teach us how to identify the hacker hacking into your computer. It does n’t matter how strong you are creating passwords, there is always be an option for hackers to crack your passwords. The hackers Nowadays have been creating well-developed algorithms, which can speed up the processes to discover your password codes. So if you are one of them who thought that putting up a tough password is a secure way to stay away from hacker then this article is just for you. Today we will discuss some password Cracking techniques used by hackers to hack into our account. 1. Dictionary Attack Dictionary Attack is a technique used by most of the regular hackers to determine the passphrase by trying their luck many times. Unlike its name, it works like a dictionary it is just a simple file wh...