Is there any course for Hacking? How the people in become
hackers?
Answers were Sorted based on User's Feedback
Answer / ratnadeepak.b
Don't use the word Hacking man.. it's a crime... just go for
some ethical hacking courses like CEH(Certified Ethical
Hacking) certification provided by the EC-Council. this is
the basic step for ur Ethical Hacking........ All the Best
| Is This Answer Correct ? | 15 Yes | 3 No |
Answer / suba mca
it means the hacker is stoleing the securty informations.
ie. username and password.
| Is This Answer Correct ? | 4 Yes | 1 No |
Answer / amol patil
ethical hacing it's not crime it secure to us.
cource available reliance web world all over imdia ankit
fadia certified ethical hacking .
cracking is crime
| Is This Answer Correct ? | 2 Yes | 3 No |
Answer / k.suba sheela mca
it means the hacker is just like thieh. they are finding
the security seceret key word.
they stoleing the informations without the user permission.
ie owner,
| Is This Answer Correct ? | 4 Yes | 10 No |
what is active directory partication ?
what purpose we are using the ARP ? what purposes we are using ip config?
How Can I recover My Hotmail Account without phone no and email?
What protects and describes the Chinese Wall model?
What is threat-focused ngfw?
1- what is PHP ? 2- what is TS getway and TS application ? 3- what is channel in telecom and y we use ? 4- what is difference between spyware and mallware ? 5- what is main difference between standard and extended ACL ? please repley in sequence
I am working in a Engg college at Orissa. I am having windows xp OS. We have a linux server in CSE dept. My question is that in client site I want access facebook and torrent sites. The above sites are blocked in Linux server. So How can I unblock these particular sites in client system. Is there any software available for that ? plz give me some idea about this ?
How does dlp work?
What are the properties of universal trojan horses?
What is risk in IT-Security?
Which are the different factors that affect the security of a network?
What are the 5 aspects of IT-Security?