View our 2018 and 2019 listing of information security (infosec) / cyber security training courses, events and conferences from around the world that are associated with Hacking.
Hacking is unauthorized intrusion into a computer or a network. The person engaged in hacking activities is generally referred to as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system.
Hackers employ a variety of techniques for hacking, including:
- Vulnerability scanner: checks computers on networks for known weaknesses
- Password cracking: the process of recovering passwords from data stored or transmitted by computer systems
- Packet sniffer: applications that capture data packets in order to view data and passwords in transit over networks
- Spoofing attack: involves websites which falsify data by mimicing legitimate sites, and they are therefore treated as trusted sites by users or other programs
- Root kit: represents a set of programs which work to subvert control of an operating system from legitimate operators
- Trojan horse: serves as a back door in a computer system to allow an intruder to gain access to the system later
- Viruses: self-replicating programs that spread by inserting copies of the same program into other executable code files or documents
- Key loggers: tools designed to record every keystroke on the affected machine for later retrieval
Certain corporations employ hackers as part of their support staff. These legitimate hackers use their skills to find flaws in the company security system, thus preventing identity theft and other computer-related crimes.
Apologies, but no results were found for the requested archive.