Search This Blog

Wednesday, January 11, 2012

Basic Terminology

This post describes some of the basic terminologies involved in Ethical Hacking:
  • Threat - An event or action that might prejudice security. It can also be termed as a potential violation of security.
  • Vulnerability - Presence of a weakness in a computer system that can lead to an undesirable event compromising the security of the system.
  • Attack - Any action that attempts to violate security of a system.
  • ExploitA piece of software, a data chunk, or command sequence that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
  • IP AddressAn Internet Protocol address (IP address) is a logical network address of each device (eg. computer, printer) participating in a computer network for the purpose of identification and addressing.
  • MAC Address - Media Access Control (MAC) address is a unique serial number assigned to network adapters for identification on the network. 
  • DNS - Domain Name System (DNS) is a  hierarchical distributed naming system that translates domain names to IP addresses.
  • LAN - Local Area Network (LAN) is a small computer network covering a local area, such as a home or office.
  • Client - Aapplication or system that accesses a service made available by a server.
  • Server - A server is a computer program running to serve the requests of other programs (clients).
Other terminologies will be included and described as and when encountered during our exploration.

Tuesday, January 10, 2012

HACKNOWLEDGED

In this technical era information is power, but in recent times we have seen that this power can be abused if it gets into wrong hands. The recent events in the field of computer security has forced us to think that, is our information really secure??? 
The Aim of this Blog is to the make people understand and learn the art and science of testing computers, networks and web sites for security vulnerabilities and plugging the holes before the bad guys get a chance to exploit them. 
The blog posts will contain InfoSec related articles, tutorials, news updates, tool releases and much more.


INFORMATION IS POWER. INFORMATION IS LEVERAGE