Skip to main content

Posts

Showing posts from May, 2019

5 ways to secure your smartphones from attacks!!!

   Sounds like you will literally came up with the pop ups that you will see some kind of applications that will protect your data from attacks. Sorry but I am not going to give any kind of application which will protect you from attacks but I am going to share some tips some activities when you follow then definitely you will be more secure from attacks in today's world.        In present time 90% of the people are using smartphones and more than half of time in a day they are connected with the internet. You know very well that if there is positivity then there is also a negativity, a coin has two sides. Then if we are using technology in good side then there is also a bad side that you will not do but has experienced. You know very well what I am going to talk about. So in today's world major attacks are based on to stealing personal and confidential information of users, organizations. Most of the time people  are using smartphones than computers, because it is easy to ha

How to Learn free Ethical Hacking Tutorial 4 :- Hackers' Mindset & Motivation

Hello  Hackers !!! Hope you guys are going well and learning good with us. Thank you for supporting us by giving time and reading our blogs and articles regularly. Your support and love for reading makes us write more. Coming to the tutorial part, before starting with the hacking part, I would like to help you guys in understanding some fundamentals related to Hacking. In today's post, we will be indirectly coming to know the hacker's mindset and motivation area, which inspires a person to be a hacker. We all knows that there must be something which makes a person do something. So, similarly in the field of hacking also, motivation and mindset matters a lot before deep diving into it. First we will see the motivation scopes and then we will see the types of mindsets which a hacker can have. As we have seen that there are different types of hackers in previous tutorials, it ultimately depends on the mindset of a hacker. Hacker Motivation:- Majorly, we can distingui

How to Learn free Ethical Hacking Tutorial 3 :- CIA Triad of Information Security

Hello Hackers !!! Hope you guys are learning well.  Coming back to the tutorial number 3, today we are going to learn some of the important terms or essentials for securing information or data in simple language. When we talk about securing our data, what exactly does it means? Keeping passwords in smart phones and laptops makes it secure? The answer is big  NO!  Yeah, it is true. We have to make data secure in such a way that only authorized user can have access to it. Majorly, there are three most important pillars in the field of cyber security to be taken care of.  They are: A) Confidentiality,  B) Integrity &  C) Availability .  People call it as  CIA triad . This is a model designed in such a way that guides the security framework policies of any organization. Let us understand them one by one, A) Confidentiality:-  In the world of computer systems, keeping important information secret from unauthorized users is a tough work. Confidentiality refers to the same. T

How to Learn free Ethical Hacking Tutorial 2 :- Introduction 2

Hello Hackers !!! I hope you guys  understood the things which were discussed in it. So, in continuation of it, we will discuss other types of hackers here and also some other topics as well. Let's get started..... =>  Red Hat Hackers:-   In simple language, red hat hackers are those ones who are like white hats but not good for them who tried to become black hat ones. They use to hack back them who hacks just to earn money or to take revenge, instead of reporting any vulnerability to anyone. They perform hacks by uploading various types of malwares, by performing DOS or DDOS attack in order to destroy their computer from inside. They have a kind of aggressive nature of punishing the culprits by hacking them back, and they hacks in such a way that those bad hackers need to buy new computer. =>  Blue Hat Hackers:-  Blue Hat Hackers are those hackers who have an intention of taking revenge from those who has done something against their wish. They will be script kidd

How to Learn free Ethical Hacking Tutorial 1 :- Introduction 1

Welcome to  Hackers !!! Today, I am going to start a series on  Ethical Hacking Tutorials  to spread awareness.  This series of Ethical Hacking Tutorial is for Educational purpose only, any wrong and illegal activity is not promoted by me or my team of Dark Street Hackers.  In this first tutorial, we will be looking at what is cyber security, why we need it, who are the hackers and much more. So, without wasting time, let's get started with it. What is Cyber Security? Cybersecurity is the act of securing frameworks, systems, and projects from advanced assaults. These cyberattacks are typically initiated for changing, or crushing touchy data; blackmailing cash from clients; or intruding on ordinary business forms. In simple words, I can say, it is a process of making digital data secure using various tools and techniques before an attacker or bad guy tries to access it. Why we need Cyber security? Nowadays, everything is online and lots data is being saved in the di

Best Books