Skip to main content
Practices for ethical hacking
Penetration Tests
Advices and tips for penetration tests
    • by 
    •   4  
      Ethical HackingEthical HackerEthical Hacking and Information SecurityInformation Security and Ethical Hacking
    • by 
    •   19  
      Information SecurityInformation Security AuditingInformation Security and PrivacyCloud Computing
Humans communication and interaction have dramatically changed in the last century with the introduction of advanced technologies. One important form of communication are electronic mails (email), as it is not only used for personal... more
    • by 
    •   2  
      Penetration TestingEthical Hacking and Information Security
The essential difficulty about Computer Ethics’ (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE... more
    • by 
    •   36  
      Information SystemsBusiness EthicsComputer ScienceInformation Technology
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers... more
    • by 
    •   19  
      Information SecurityInformation Security AuditingInformation Security and PrivacyCloud Computing
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against... more
    • by 
    •   19  
      Distributed ComputingCryptographyInformation Security and PrivacyLightweight Concrete
Through this presentation you will learn how hackers manipulate networks and system and how we can diffuse their efforts.
    • by 
    •   9  
      Information SecurityInternet SecurityComputer SecurityCybersecurity
    • by 
    •   7  
      EngineeringComputer ScienceComputer EngineeringEthical Hacking
Le mode d'apprentissage CEH eLEARNING respecte scrupuleusement la totalité du cursus de formation officiel EC-Council. Le cursus eLEARNING aborde de manière successive chaque module tel le cours présentiel BOOTCAMP avec des exercices, des... more
    • by 
    •   7  
      HackingComputer HackingEthical HackingHackers
Code Injection techniques in Application Security enables an attacker/ a malware artist or a hacker/ethical hacker/ penetration tester to leverage advantage of missing security controls over JavaScript Execution on top of the application... more
    • by 
    •   11  
      Information SecurityInformation Security AuditingComputer SecurityEthical Hacking
This paper discusses the significant roles of virtual reality in education and healthcare. It shows a strong influence and effect to the educational and health practitioners and the sectors. This paper offers some uses of virtual reality... more
    • by 
    •   16  
      Human Computer InteractionInformation SecurityData MiningDatabase Systems
    • by 
    •   9  
      HackingComputer HackingEthical HackingHardware Hacking
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists,... more
    • by 
    •   19  
      Mathematics of CryptographyInformation SecurityApplied CryptographyInformation Security Auditing
Una guía practica para quienes nos apasiona el mundo de la seguridad informatica y estan en los inicios.
    • by 
    •   8  
      CybersecurityHackingComputer HackingEthical Hacking
    • by 
    •   5  
      HackingComputer HackingEthical HackingHackers
    • by 
    • Ethical Hacking and Information Security
The emergence of Corona Virus Disease (COVID-19) has threaten individuals, organisations and Government Agencies across the world and grounded almost everything to a halt. COVID-19 continues to spread rapidly asymmetrically around the... more
    • by 
    •   11  
      Information SystemsCloud ComputingTeleworkingSocial Engineering
    • by 
    •   8  
      Mechanical EngineeringRenewable EnergyGasificationSolar
This article is very informational for beginners you'll learn a lot about Meterpreter Paranoid Mode in this article. If I am not wrong I think in 2015, hackers realized that it is possible to steal/hijack someone's meterpreter session by... more
    • by 
    •   9  
      Software EngineeringInformation SecurityComputer SecurityCryptography
In modern technical world internet is the main information provider and storing method. The security state on the internet is getting worse. Ethical Hacking techniques are introduced to increase online security by identifying known... more
    • by 
    • Ethical Hacking and Information Security
Information is a valuable asset to any organization or person in specific. This information should be well maintained (free from danger).When ordinary information is so important, imagine how important the sensitive information is. The... more
    • by 
    • Ethical Hacking and Information Security
Organizations dealing with IT across the globe would be interested to know how secure their system or network and will be interested to know the vulnerabilities present. Many lone wolf ethical hackers and cyber security companies offer... more
    • by  and +1
    •   32  
      Information SystemsInformation TechnologyCriminal LawCyberlaw
this pdf file conatins the list of most popular only free proxy providing sites
    • by 
    •   17  
      HackingComputer HackingIan HackingEthical Hacking
This theme issue has the founding ambition of landscaping Data Ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and... more
    • by  and +1
    •   249  
      Business EthicsEngineeringComputer ScienceAlgorithms
In October 2016, the White House, the European Parliament, and the UK House of Commons each issued a report outlining their visions on how to prepare society for the widespread use of artificial intelligence (AI). In this article, we... more
    • by  and +3
    •   80  
      Information SystemsRoboticsComputer ScienceAlgorithms
    • by 
    •   20  
      BusinessBusiness AdministrationComputer ScienceRobotics (Computer Science)
Is your WordPress site infected with any kind of Malware? More than 70% of top ranking websites hosted on WordPress displayed serious security vulnerabilities which lead to malware attacks. Well, your website could also be one among them... more
    • by 
    •   16  
      Information SecurityWeb DesignWeb TechnologiesSoftware Development
    • by 
    •   216  
      BusinessBusiness EthicsComputer ScienceInformation Technology
The paper investigates the ethics of information transparency (henceforth transparency). It argues that transparency is not an ethical principle in itself but a pro-ethical condition for enabling or impairing other ethical practices or... more
    • by  and +1
    •   166  
      Visual SociologyComputer ScienceComputer ArchitectureComputer Graphics
Humans communication and interaction have dramatically changed in the last century with the introduction of advanced technologies. One important form of communication are electronic mails (email), as it is not only used for personal... more
    • by  and +1
    •   3  
      Penetration TestingEthical Hacking and Information SecurityNETWORKING, SECURITY, LINUX
    • by 
    •   32  
      International RelationsSocial SciencesInformation SecurityCybercrimes
Social robots should be able to operate in highly challenging environments populated with complex objects and in social settings involving humans, animals, and other robots. Despite these challenges, we expect these robots to be mindful... more
    • by 
    •   6  
      Web ApplicationsArtifical IntelligenceSensorsActuators
Reconociendo la necesidad de una entre los Estados y el sector en la . contra la ciberdelincuencia, así como la necesidad de los legítimos intereses en la utilización y el desarrollo de las tecnologlas de la... more
    • by 
    •   7  
      HacktivismComputer HackingEthical HackingHackers
The European Medical Information Framework (EMIF) project, funded through the IMI programme (Innovative Medicines Initiative Joint Undertaking under Grant Agreement No. 115372), has designed and implemented a federated platform to connect... more
    • by  and +2
    •   168  
      Business EthicsMedical SociologyComputer ScienceRobotics (Computer Science)
    • by 
    •   132  
      Business EthicsComputer ScienceMilitary EthicsPhilosophy
This paper aims to provide enhancements in the privacy preserving model that was published in our previous paper entitled "An Effective Privacy Preserving Model for Databases Using (α, β, k) - Anonymity Model and Lossy Join" [1]. The... more
    • by 
    •   11  
      Information SystemsComputer ScienceInformation TechnologyInformation Security
Perform an effective, organized, and effective assessment test from begin to end. Gain hands-on hacking and assessment test experienced by building a virtual lab setup that includes commonly known security problems such as IDS/IPS and... more
    • by 
    •   8  
      Information SecurityComputer SecurityHackingComputer Hacking
    • by 
    •   13  
      HackingComputer HackingEthical HackingHardware Hacking
Nje prezantimi i shkurter mbi hacking dhe hackers
    • by 
    •   12  
      Academic WritingHackingComputer HackingIan Hacking
    • by 
    •   31  
      Information SecurityInternet SecurityInformation Security, Assurance and AuditInformation Security and Privacy
In today’s world cloud computing is being a new utility and its usage is growing day by day. This advancement in services being delivered is getting densely populated and complexed with some peculiar problems even with this advancement.... more
    • by 
    •   12  
      Computer ScienceInformation SecurityInformation Security and PrivacyCloud Computing
    • by 
    •   3  
      IT Project ManagementEthical Hacking and Information SecurityKali Linux
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against... more
    • by  and +1
    •   19  
      CryptographyInformation Security and PrivacyLightweight ConcreteSecurity Analysis
In this article, we argue that personal medical data should be made available for scientific research, by enabling and encouraging patients to donate their medical records once deceased, in a way similar to how they can already donate... more
    • by  and +2
    •   143  
      Business EthicsMedical SociologyComputer ScienceInformation Technology
The concept of distributed moral responsibility (DMR) has a long history. When it is understood as being entirely reducible to the sum of (some) human, individual, and already morally loaded actions, then the allocation of DMR, and hence... more
    • by 
    •   145  
      Business EthicsMilitary EthicsPhilosophyEthics
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers... more
    • by 
    •   20  
      Information SecurityBusiness/IT AlignmentInformation Security AuditingInformation Security and Privacy
Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication... more
    • by 
    •   19  
      Information SecurityInformation Security AuditingInformation Security and PrivacyInformation System Security
In this article, we will learn about Railgun. Railgun is a meterpreter—only Windows exploitation feature. It allows direct communication to Windows API. This article includes just an example of a function call. We can use Railgun to... more
    • by 
    •   10  
      Human Computer InteractionInformation SecurityWeb DesignComputer Security
    • by 
    •   164  
      Business EthicsRoboticsSystematics (Taxonomy)Computer Science