Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is phishing?

Answer Posted / amitmalik(amity)

hii
phishing is done by black hat hackers to stole the senstive
information via mail address, web sites by use of cross site
scripting(XSS)

Is This Answer Correct ?    2 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain the difference between discretionary access control and mandatory access control?

941


What are manageable and non manageable switches?

1013


explain what is meant by port blocking within lan?

984


Can you give me some ransomware variants?

965


What is a DNS resource record

1027


What are the data units at different layers of the TCP / IP protocol suite

1005


What is site-to-site vpn?

930


What is network access control?

1047


What factors would you consider before deploying a web intrusion detection system?

938


What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?

954


What is a ddos attack?

903


What is IPCONFIG command? Why it is used?

1181


What are the types fo ddos attacks?

1064


Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?

922


How does ransomware work?

1019