This blog is only for educational purpose to learn about Ethical Hacking. I am not responsible for any type of crime. My main motive is to spread awareness about Ethical Hacking, Cyber Security , Sciences & Technology .
ETHICAL HACKING
Sunday, 19 April 2020
What is Keylogger? Uses of Keylogger in Hacking ?
Sometimes it is called a keystroke logger or system monitor is a type of surveillance technology used to monitor and record each keystroke type a specific computer's keyboard. It is also available for use on smartphones such as Apple,I-phone and Android devices.
A keylogger can record instant messages,email and capture any information you type at any time using your keyboard,including usernames password of your social media ac and personal identifying pin etc thats the reason some hacker use it to hack social media account for money extortion.
How to detect keylogger on a system?
This is Aditya Nagaich. I have basic knowledge of Ethical Hacking, Cyber Security, Digital Marketing and BPO Industry. I am a Brand Promoter in Social Media Marketing as well as Offical Content Writer also at Blogger.
follow me on insta-anoymous_adi
Saturday, 8 February 2020
USE OF CRYPTOGRAPHY IN HACKING
WHAT IS CRYPTOGRAPHY?
The Cryptography is derived from the Greek words "Kryptos". This is the study of secure communication techniques that allow only the sender and recipient of a message to view it's contents of transforming information into nonhuman readable form or vice versa is called cryptography.
As we know that information plays a vital role in running of any business and organizations etc, sensitive details in the wrong hands can leads to loss of business.
Cryptography is the science of ciphering and deciphering messages.To secure communication organizations use cryptology to cipher information .
Or
Cryptography is a method of protecting information and communication through the use of codes so that only those whom the information is intended can read and process it.
In Computer Science, Cryptography refers to secure information and communication techniques derived from mathematical concepts , a set of rule based calculations called algorithm to transform message in ways the hard to readable for human.
This is one of the secure way of communications for a hacker with the help of virtual private network(VPN) like Tor Browser which is also very helpful to change the IP Address(Location of the sender ) for illegal purpose to perform crime in cyberspace . I will discuss in brief about the VPN .
How to Encrypt and Decrypt the text in Cryptography?
Open this website with the help of internert surfing for encryption-"http://wwwmd5online.org"
Open the link for Decrypt the code text-"http://www.md5online.org/md5-decrypt.html"
Type whatever you want for encryption and it will crypt in the code form, copy that code and forward to the intended person whom you want for secure communication and then he/she will Decrypt in the real form.
Labels:
#cryptocurrency,
#cryptographer,
#cryptography,
#cryptology,
#hacker,
#hacker used cryptography,
#nonreasble data trick,
#secure information,
#types of cryptography,
#use of cryptography in secure information
This is Aditya Nagaich. I have basic knowledge of Ethical Hacking, Cyber Security, Digital Marketing and BPO Industry. I am a Brand Promoter in Social Media Marketing as well as Offical Content Writer also at Blogger.
follow me on insta-anoymous_adi
Subscribe to:
Posts (Atom)