• November 7, 2024

MCA Fifth Semester Model Papers

Faculty: IT 2019 Sample Papers with Solutions Sr. No.  Paper Name  Question Paper Link  Solution Link 1.  Cloud Computing  Click Here  Click Here 2.  Analysis & Design of Algorithm  Click Here …

MCA Third Semester Model Papers

Faculty: IT 2019 Sample Papers with Solutions Sr. No.  Paper Name  Question Paper Link  Solution Link 1.  Java Technologies  Click Here  Click Here 2.  Web Technologies  Click Here  Click Here 3. …

MCA First Semester Model Papers

Faculty: IT 2019 Sample Papers with Solutions Sr. No.  Paper Name  Question Paper Link  Solution Link 1.  Discrete Mathematics  Click Here  Click Here 2.  Programming in C & C++  Click Here …

MSC (Biotechnology) Previous Year Model Papers

Faculty: Science 2019 Sample Papers with Solutions Sr. No.  Paper Name  Question Paper Link  Solution Link 1  Immunology, Virology and Pathogenesis  Click Here  Click Here 2.  Cell Biology  Click Here  Click …

MSC (Biotechnology) Final Year Model Papers

Faculty: Science 2019 Sample Papers with Solutions Sr. No.  Paper Name  Question Paper Link  Solution Link 1  Plant Biotechnology  Click Here  Click Here 2.  Genetic Engineering  Click Here  Click Here


Hacking….The one of best interesting topic for IT person. Exactly what is hacking?
In computer networking system, hacking is the technical effort of changing, modifying, manipulating the behavior of network connection and the connected Device. The person who goes for hacking has known as a Hacker.
Hacking done on the computer network by writing some programmatically, codes or we can say some scripts that will run automatically with attached program. Here I am going to describe some hacking techniques used for hacking.
1. Phishing
Phishing is the most popular method used by hackers for hacking the password of a person’s facebook ID and it is an easiest process of hacking Facebook ID password.
Phishing, the hacker creates a login page, which is look like original login page. After creating this fake login page hacker asks from the person whose password he\she wants to hack for login into the page. Once the person login into fake page the parson’s email id and password has saved in a text file, and than the hacker has succeeded in his\her task of getting password of that person.
2. Key logging
Key logging is also a easiest way of getting any persons password and important data. A Key logger is a small program, which has installed on the system of person. Once it has installed on the system, it will start recording all the data whatever person type on his system. The recorded data is send back to the hacker by using FTP or mailing information.
3. Stealer’s
Stealer’s as the name meaning go, is the process stealing data from the person’s system. Stealer’s are basically a software which is designed to steal the saved information (like password) from the person’s system.
4. Session Hijacking
Session Hijacking is more difficult than others are. In session, hijacking hacker used person’s browser cookies. Server for authentication of client person uses cookies. That means hacker steals the cookies and uses it for accessing person’s account on website. Session hijacking used in LAN and WIFI networks.

Shashi Naruka

Author

Leave a Reply