Ethical Hacking and Information Security
12,370 Followers
Recent papers in Ethical Hacking and Information Security
Practices for ethical hacking
Penetration Tests
Advices and tips for penetration tests
Penetration Tests
Advices and tips for penetration tests
Humans communication and interaction have dramatically changed in the last century with the introduction of advanced technologies. One important form of communication are electronic mails (email), as it is not only used for personal... more
The essential difficulty about Computer Ethics’ (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE... more
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers... more
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against... more
Through this presentation you will learn how hackers manipulate networks and system and how we can diffuse their efforts.
Le mode d'apprentissage CEH eLEARNING respecte scrupuleusement la totalité du cursus de formation officiel EC-Council. Le cursus eLEARNING aborde de manière successive chaque module tel le cours présentiel BOOTCAMP avec des exercices, des... more
Code Injection techniques in Application Security enables an attacker/ a malware artist or a hacker/ethical hacker/ penetration tester to leverage advantage of missing security controls over JavaScript Execution on top of the application... more
This paper discusses the significant roles of virtual reality in education and healthcare. It shows a strong influence and effect to the educational and health practitioners and the sectors. This paper offers some uses of virtual reality... more
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists,... more
Una guía practica para quienes nos apasiona el mundo de la seguridad informatica y estan en los inicios.
The emergence of Corona Virus Disease (COVID-19) has threaten individuals, organisations and Government Agencies across the world and grounded almost everything to a halt. COVID-19 continues to spread rapidly asymmetrically around the... more
This article is very informational for beginners you'll learn a lot about Meterpreter Paranoid Mode in this article. If I am not wrong I think in 2015, hackers realized that it is possible to steal/hijack someone's meterpreter session by... more
In modern technical world internet is the main information provider and storing method. The security state on the internet is getting worse. Ethical Hacking techniques are introduced to increase online security by identifying known... more
Information is a valuable asset to any organization or person in specific. This information should be well maintained (free from danger).When ordinary information is so important, imagine how important the sensitive information is. The... more
this pdf file conatins the list of most popular only free proxy providing sites
Is your WordPress site infected with any kind of Malware? More than 70% of top ranking websites hosted on WordPress displayed serious security vulnerabilities which lead to malware attacks. Well, your website could also be one among them... more
Social robots should be able to operate in highly challenging environments populated with complex objects and in social settings involving humans, animals, and other robots. Despite these challenges, we expect these robots to be mindful... more
Reconociendo la necesidad de una entre los Estados y el sector en la . contra la ciberdelincuencia, así como la necesidad de los legítimos intereses en la utilización y el desarrollo de las tecnologlas de la... more
This paper aims to provide enhancements in the privacy preserving model that was published in our previous paper entitled "An Effective Privacy Preserving Model for Databases Using (α, β, k) - Anonymity Model and Lossy Join" [1]. The... more
Perform an effective, organized, and effective assessment test from begin to end. Gain hands-on hacking and assessment test experienced by building a virtual lab setup that includes commonly known security problems such as IDS/IPS and... more
Nje prezantimi i shkurter mbi hacking dhe hackers
In today’s world cloud computing is being a new utility and its usage is growing day by day. This advancement in services being delivered is getting densely populated and complexed with some peculiar problems even with this advancement.... more
The concept of distributed moral responsibility (DMR) has a long history. When it is understood as being entirely reducible to the sum of (some) human, individual, and already morally loaded actions, then the allocation of DMR, and hence... more
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers... more
Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication... more
In this article, we will learn about Railgun. Railgun is a meterpreter—only Windows exploitation feature. It allows direct communication to Windows API. This article includes just an example of a function call. We can use Railgun to... more