Hey guys, today I will share about Proxy sites, what it is and its uses. Proxy acts as the intermediate between the hacker’s system and web server. In common proxy is an application or computer system which covers your IP address to seek the information from the web server. An attacker (attacker) connects to the proxy server, requesting some service, such as a web page, or other resource available from a different server. The proxy server evaluates the request according to its filtering rules. It may filter by IP address or by a protocol. That is, it will change your IP address or it will convert your request into a protocol allowing you to access the content of that sever. Here is the scenario of one of
Showing posts with label internet. Show all posts
Showing posts with label internet. Show all posts
Friday, 14 February 2014
FIREWALL – HOW IT WORKS?
Hey… Here today I came up with an article on Firewalls. I will speak about how it works and how are they useful for cyber security purpose. Well if you are a regular internet user then you might have heard of the word ‘firewall’ long time before. Well, I will explain it to you with a simple example, when an employee in his office tries to access a website such as social network they get a message “Firewall used” on their screen! This is what the function of a firewall. A firewall protects the entire corporate network so that hackers cannot enter into your private (corporate) network.
COMPUTER MONITORING SOFTWARE IN 2012 – ADVANCED KEYLOGGERS
Today, keylogger would only paint half a picture of someones computer activity and because of this the name ‘Keylogger’ has progressed to become ‘Computer Monitoring Software’. Through the internet, you can access a whole range of computer monitoring software and keyloggers, some are malicious, some aren’t, but they usually encompass a range of standard features.
Labels:
email,
facebook,
hack,
hacker,
internet,
introduction,
keybord,
keyloggers,
monitor,
security,
windows 7,
windows 8,
windows 8.1