Tips N TRIKS: internet
Showing posts with label internet. Show all posts
Showing posts with label internet. Show all posts

Friday, 14 February 2014

INTRODUCTION TO PROXY SITES

February 14, 2014 7
INTRODUCTION TO PROXY SITES

INTRODUCTION TO PROXY SITES

Basic idea about how proxy works!
Hey guys, today I will share about Proxy sites, what it is and its uses. Proxy acts as the intermediate between the hacker’s system and web server. In common proxy is an application or computer system which covers your IP address to seek the information from the web server. An attacker (attacker) connects to the proxy server, requesting some service, such as a web page, or other resource available from a different server. The proxy server evaluates the request according to its filtering rules. It may filter by IP address or by a protocol. That is, it will change your IP address or it will convert your request into a protocol allowing you to access the content of that sever. Here is the scenario of one of

FIREWALL – HOW IT WORKS?

February 14, 2014 0
FIREWALL – HOW IT WORKS?

FIREWALL – HOW IT WORKS?

Hey… Here today I came up with an article on Firewalls. I will speak about how it works and how are they useful for cyber security purpose. Well if you are a regular internet user then you might have heard of the word ‘firewall’ long time before. Well, I will explain it to you with a simple example, when an employee in his office tries to access a website such as social network they get a message “Firewall used” on their screen! This is what the function of a firewall. A firewall protects the entire corporate network so that hackers cannot enter into your private (corporate) network.

ADVANCED KEYLOGGERS

February 14, 2014 0
ADVANCED KEYLOGGERS

COMPUTER MONITORING SOFTWARE IN 2012 – ADVANCED KEYLOGGERS

Back in the old-skool days of MS-DOS and Windows 3.0 a keylogger did exactly what its name implied – logged pressed keystrokes. Sometimes this happened stealthily, sometimes not. These days though, the days of Facebook, Youtube, Digital Cameras,Webcams and Emails, the requirements of a keylogger have evolved with the technology it’s meant to monitor.
Today,  keylogger would only paint half a picture of someones computer activity and because of this the name ‘Keylogger’ has progressed to become ‘Computer Monitoring Software’. Through the internet, you can access a whole range of computer monitoring software and keyloggers, some are malicious, some aren’t, but they usually encompass a range of standard features.

Thursday, 13 February 2014

‘CUT OFF’ INTERNET CONNECTION OF YOUR FRIEND!

February 13, 2014 0
‘CUT OFF’ INTERNET CONNECTION OF YOUR FRIEND!

‘CUT OFF’ INTERNET CONNECTION OF YOUR FRIEND!







THE DARK SIDE OF INTERNET

February 13, 2014 0
THE DARK SIDE OF INTERNET

DEEP WEB – THE DARK SIDE OF INTERNET


The_Deep_WebWell, most of you might be wondering after reading the title of this article, so firstly let me tell you this. Today I am going to give an introduction to the dark side of internet where there lies no rules, no law enforcement and complete access to the information that is not known to most of the people. We live in a society where people believe that if there is no answer provided by Google then it might have never existed, but what if I tell you that the internet what you see is just 1% of the actual web. There lays information hidden to people, which is nearly 10,000 terabytes, which is 500 times larger than the web we see (Surface web). The figures are taken from a research conducted Bergman in 2001. Currently the deep web is much wider than the figures above.