Posts

Showing posts from July, 2017

GitHub

Image
GitHub is cloud based publishing tool and hosting platform also has a desktop application for locally storing projects.it is changing our way of working in web development. they provide central cloud to storing, exchanging, testing, publishing and collaborate with these projects. you have to work more then one developers working on a project github is helping for you. git hub has best platform for developers share prototypes and collaborate on project also edit or build upon each others code. Reasons why developers rely on github: Collaboration made simple. Version control made easy. A working directory. The github repository. Branches.

Social Engineering

Image
What is the Social Engineering? Social Engineering is the art. they can took off the secret information and valuable things by using this tool. its most dangerous thing in the present world because even child can do this kind of attacks. social engineering is depend on human nature. also social engineering attacks are depend by two type one is   human based methods other one is computer based methods. Common social engineering attacks may use your trust and curiosity. contain a link contain a download may create a compelling story or pretext. urgently ask for your help. ask you to donate to their charitable fundraiser. have a scenario or story. the message may explain there is problem. the message may notify you that you are a winner. so if we Research the facts of about things we can definitely do not be victim of any attacks.

Google Hacking

Image
Do you know? We can hack lots of value things by using google. google is the most effective search engine it can search anywhere in the network. that's why we use to google for website searching. but that also disadvantages for another internet user because anybody can access our data through the network leaks by using google. so we should check the network leaks and fix it. that's is the only way for protecting our data from google hacking.

Cyber Attacks

Image
Cyber attacks are more dangerous thing in the modern world. So we should know about that. normally cyber attack has 2 type of attack those are active and passive attacks. both attacks use man in the middle (MITM) attack methods. What is the man in the middle?? A man-in-the-middle attack is a type of cyber attack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. Man-in-the-middle attacks can be abbreviated in many ways, including MITM, MitM, MiM or MIM What is active attack??  Meaning of   Active attack   malicious actor can change the valuable things which are trough the conversation between two parties.  What is  passive at