This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Network Hacking

There are many types of networks, from Internet networks to printer networks and they can all be illegally accessed and hacked in various ways. Some networks can be relatively simple to gain supervisor or admin access in order to access private files or to change administrator tools for others that normally use the networks involved. Hacking can be used to crash networks, upload viruses and a multitude of other illegal activities that range from irritating to costly and incredibly harmful to the system.

Hacking a network of computers in a company for example can disrupt work and incur major costs in the repair of the network overall including the installation of a higher range of security methods. The time wasted and costs associated with this can be harmful to a company especially if private or financial files have been accessed. The repercussions can be extreme in such cases. Many companies now hire people with hacking skills in order to asses how vulnerable their networking systems are and also to figure out what security methods will give them the best results. The more prolific the company, the more security is necessary in order to protect their systems.

Mobile Hacking

Although hacking is generally associated with computers, mobile phones are also at risk from hackers. Mobile phones that use wap use wireless connections to access the Internet and these connections can be easily hacked into. Phone companies have also been hacked before with the hackers gaining access into thousands of mobile phone user records. There are different ways to hack into mobile phones depending on the type of wap connection they use. Bluesnarfing for example is the specific method of hacking into phones that use Bluetooth connections. A hacker would do this in order to copy all of the information on the phone such as the contacts for instance.

People are using their mobile phones to send increasingly private information as technology enables the use of email, etc on mobile phones. Hacking of a mobile phone can cover the hacking that involves tricking the mobile phone company into providing free texts, calls or wap. It can also include the cloning of sims in order to charge calls under another person's name and number or even the use of hacking to gain access to a person's confidential information such as passwords or various account details.

Linux Hacking

Linux is an operating system that can be used on a computer. The Linux operating systems are run by the kernel which rules over the programs and hardware components. It is at the core of the system and has access to services that no other program has access to. Special tasks can only be carried out by going through the kernel first. The kernel does not allow programs to perform illegal operations and so this is why the kernel needs to be accessed in order for hacking of the Linux system to be successful.

Once a hacker gets into the Linux kernel, they can potentially change the system options in order to allow programs perform all sorts of illegal operations. It is important for the hacker to force the Linux operating system to allow these actions in order to successfully break into all areas of the system. Hacking can be used for many different reasons, from accessing private information stored in files to noting keystrokes which can be used to find out a person's passwords.

WI FI Hacking

WI FI is a way of using wireless Internet, cables are not required and it was originally designed for use with laptops and mobile phones. WI FI has become increasingly popular due to the lack of cables and cheap installation costs. Many people are now using WI FI instead of the usual Internet connections. The disadvantages of WI FI include the fact that WI FI can be easily hacked into. The most common form of encryption for WI FI can be simply hacked even if it is configured properly. There are people who travel around with laptops looking for insecure WI FI connections that can be hacked into.

Using these methods, a person could potentially "steal" use of another person's internet and break into files with ease. A great many hackers are using other people's WI FI connections in order to break into secure access files as the connection can be harder to trace to them as it is wireless and in another person's name. This type of hacking can be serious if companies that hold important files use WI FI as the sensitive information involved in the files could be easily accessed by a hacker. There have already been convictions of this type of hacking.

Wi-Fi

Wi-Fi is short for wireless Fidelity and uses the same radio frequencies as Bluetooth. The only difference between Wi-Fi and Blue tooth is the power. Wi-Fi is sometimes called wireless Ethernet.

It is used in creating networks and its configuration is more complicated and difficult than traditional networks. Wi- Fi is increasingly popular as it offers seamless connectivity without the need of wires. This feature is included in almost all laptops and many times if offered as a USB plug and play system that enables Wi-Fi on a desktop computer.

Wi-Fi certifies that network devices comply with the IEEE 802.11 wireless Ethernet standard and is widely used in a variety of hand held devices. The next generation is WiMAX and is much touted to be the replacement to WI-Fi.

Presently Wi-fi is being expanded to include a wide variety of applications in LAN's, VoIP, gaming, DVD players, digital cameras and even intelligent transport systems on cars on highways so that safety and other data can be transmitted to them while they are traveling

Intrusion Prevention

Intrusion detection system detects any intrusion. The intrusion prevention system is an automated reaction by the system to block any attack or attempted intrusion into the computer system or into the computer network.

The intrusion detection system is just a monitoring system. It sniffs packets of a switch port and logs information or generates alerts. The intrusion prevention system is one step further. It is an active intermediary like a firewall intercepting packet and forwarding them on the network only if it is ok. It blocks attacks in real time and act like an advanced firewall. Most Intrusion prevention systems contain firewall software as well. The latest generation firewalls shares it functionality of deep stateful packet inspection with an intrusion prevention engine to successfully thwart attacks to a system of private network.

Intrusion prevention systems are either host based or network based where the network based intrusion prevention systems has a larger and more modular attack prevention system when compared to a host based system

Content based as well as rate based intrusion prevention systems help in the more modern type of attacks like denial of service or distributed denial of service attacks.

Intrusion Detection

In the ambit of information security and its growing need to be protected from any attempts to destroy it or duplicate it or copy it attempts have been made to provide detection first and later prevention.

Intrusion detection is done by a variety of means the oft followed means being a manual check to detect actions that may have compromised the confidentiality, integrity or availability of the given resource. Manual detection is usually done by checking the log files and system for evidence of intrusions.

This process has been automated to an extent and is still being perfected. A system that detects intrusion automatically and alerts the administrator is called an intrusion detection system. They are designed on statistical modeling of traffic and application data to detect anomalies that happen. These can be either host based or network based. If is it host based on a single machine only it is person intrusion detection system else it is a network intrusion detection system.

The types of alerts generated by an 'IDS' is determined by how serious the intrusion is. It could generate a log of the relevant information to a file or data base or can even generate an email or a message to a pager or mobile phone.