Looking into the new world of professional social engineering..

The art of human hacking is a quite intersting topic for the young generations to learn about the fact of social and digital engineering is very important so lets get started. Nowadays social engineering can be imagined in security,goverment,education,military,psycology and every other applicant that you can imagine. we see it being used by everyone andContinue reading “Looking into the new world of professional social engineering..”

Physical security while using internet..

Digital information is at the heart of every Internet transaction. The confidentiality, integrity, and availability of that information depends on the security of the following physical constituents of any computing environment: hardware, in the broadest sense—machines, storage media, and transmission media; the physical expression of the zeroes and ones that represent digital information (data andContinue reading “Physical security while using internet..”

What is the meaning social engineering ?

With all the advances in technology, the oldest way to attack a password-based security system is still the easiest: coercion, bribery, or trickery against the users of the system. Social engineering is an attack against people,rather than machines. It is an outsider’s use of psychological tricks on legitimate users of a computer system,usually to gainContinue reading “What is the meaning social engineering ?”

“Hashing” meaning and history

Hashing A hash function is an algorithm that takes variablelength string as the input and produces a fixed-length value (hash) as the output. The challenge for a hashing algorithm is to make this process irreversible; that is,finding a string that produces a given hash value should be very difficult. It should also be difficult toContinue reading ““Hashing” meaning and history”

Protection of the passwords

Early on, the most basic and least secure method of authentication was to store passwords in plaintext (i.e., unencrypted) in a database on the server. During authentication, the client would send his or her password to the server, and the server would compare this against the stored value. Obviously, however, if the passwordfile were accessibleContinue reading “Protection of the passwords”

Going behind the passwords..

Cryptography is a powerful mechanism for securing data and keeping them confidential. The idea is that the original message is scrambled via an algorithm (or cipher), and only those with the correct key can unlock the scrambled message and get back the plaintext contents. In general,the strength of a cryptographic algorithm is based on theContinue reading “Going behind the passwords..”

How to make a best password

The ancient folk tale of Ali Baba and the forty thieves mentions the use of a password. In this story, Ali Baba finds that the phrase “Open Sesame” magically opens the entrance to a cave where the thieves have hidden their treasure. Similarly, modern computer systems use passwords to authenticate users and allow them entranceContinue reading “How to make a best password”

Design a site like this with WordPress.com
Get started