Showing posts with label Cyber-Security. Show all posts
Showing posts with label Cyber-Security. Show all posts

Sunday, October 1, 2017

Best Ethical Hacking Training Institute in Roorkee

Best Ethical Hacking Institute in Roorkee

What is Ethical Hacking?


Ethical hacking is a term to a hacking. Now a question arise, what is hacking? Hacking is a practical work to identify weaknesses in a computer system and take advantage of that weakness. These weaknesses are called as vulnerability. Here some example of hacking are password cracking, remote access, social engineering etc. Ethical hacking is a good term of hacking. Ethical hackers are never take advantages of any vulnerability. An ethical hacker find the system's vulnerabilities and inform the owner of that department to fix there system. When a ethical hacker find the vulnerabilities, it is called as penetration testing or pen testing. An ethical  hacker must be a expert in computer networks , some programming languages and latest technologies of computer stream.

Career in Ethical Hacking:-

Hacking is very big field both positively and negatively. In the hacking field we have three types of hackers:
  • ·        White Hat Hacker
  • ·         Gray Hat Hacker
  • ·         Black Hat Hacker

White Hat Hacker:- White hat hackers are good hackers. These hackers are called as a ethical hacker. White hat hackers take written permission of the owner to hack their system. White hat hacker does penetration testing and find vulnerability in the system. White hat hacker inform the system’s owner about their system’s vulnerability and fix them in a right way.

Gray Hat Hacker:- Gray hat hackers are those hackers whose intension is not good and not bad. Gray hat hacker hacks the system only for fun. They don’t take permission of owner of the system. Gray hat hacking is a wrong way to use hacking knowledge.

Black Hat Hacker:- Black hat hackers are those hackers whose has bad intension. Black hat hackers hack the system without permission of the system’s owner. Black hat hacker hacks system only for money purpose or self advantage. Black hat hacker takes advantages of system’s vulnerability. Black hat hacking is a criminal offence.

      So black hat hacking and gray hat hacking has no any career. Because these are wrong way to use your hacking knowledge. White hat hacking has a bright career for a person. You can work as a freelancer. You can tell a organization or a company for pen testing. Now days as online work is a growing industry and these companies spent their money for pen testing.
      Many organizations has a separate post of a ethical hacker, who do penetration testing on the organization’s system. Many organization owners are wants to know about their system’s security. An ethical hacker find the vulnerability on them.

Requirements for become a Ethical Hacker:-

For become a ethical hacker you must have these knowledge in computer science stream:-
  • ·        You must have passion to learn about hacking.
  • ·         You must have a IT background because it helps you to learn topics of ethical hacking.
  • ·         You don’t need any degree or a particular age criteria.
  • ·         Don’t use your ordinary skill in wrong way. You should be a honest person.
  • ·         You must know about programming languages concepts like java, php, python etc.


How can you learn Ethical Hacking?

If you wants to learn ethical hacking, you must have interest in computer science stream. You must join a training institute who train you in ethical hacking.  As my opinion you must join Cetpa InfotechPvt. Ltd. is the best Ethical Hacking Training Institute in Roorkee. Many institutes are place in every corner in the city but Cetpa Infotech Pvt. Ltd. is the best training institute in Roorkee. If you are really interested to learn about ethical hacking than Cetpa Infotech is the best training institute for you. Cetpa Infotech Pvt. Ltd. is the reputed institute in the city. Cetpa Infotech Pvt. Ltd. has been offering to learn ethical hacking for fresher and pass out. You can join Ethical Hacking Training program as summer training or winter training. Cetpa Infotech Pvt. Ltd. has well educated and experienced trainer to train you in Ethical Hacking term. Cetpa Infotech Pvt. Ltd.’s trainers train you to protect yourself as well as your organization. Cetpa Infotech Pvt. Ltd. is providing fully practical knowledge basic level and advance level of Ethical hacking training in Roorkee. At Cetpa Infotech. Pvt. Ltd. you can get best knowledge about Ethical hacking training in Roorkee.
    Cetpa Infotech Pvt. Ltd. provides a reputed certificate. The certificate is certified that you are a certified ethical hacker. This certificate helps you for get a reputed position in a organization or company. Cetpa Infotech Pvt. Ltd. is the one of the most popular Ethical Hacking training institute in Roorkee. You can get here full knowledge of Ethical hacking. Cetpa Infotech Pvt. Ltd. starts special batches for summer training and winter training. Cetpa Infotech Pvt. Ltd. prepare thousands of certified Ethical Hacker. Cetpa Infotech Pvt. Ltd. provide the Ethical hacking training in various cities like Roorkee, Dehradun, Noida and Lucknow.
If you want to know more about Ethical Hacking then you should click here.

Get 20% Off in Marble Restoration in Boca Raton

Tuesday, September 12, 2017

Why software updates necessary | why update software | Software update



Hello friends.
    Many people ask me that why software update necessary.  They tell me that if we don't update our software than it's work properly. So why we update application or software. So please read this article to know about why software updates are necessary.
  Software updates give us a better performance of the software. Software updates are totally depends on software developer. What we get by software update it's depend upon software developer. If software developer wants to give us some new features then if we update our software than we get those new features who developer gives us.
   In the software update the most important thing is our security flows. When a software developer release a new software so that time software have many types of bugs which bugs can be used by a hacker who wants to hack that software. Ex. if a software is related to our banking services then the software must bug free. Now many peoples ask me that what is bug? So a bug is a weak point of any software. If the software developer don't update our software then a hacker can be hack that software easily because hacker spends a lot of time with software to know it's weak point. And if the software is updated than it'll change in a new version and the hacker needs a lot of new time to hack that software. So this is the main reason to update a software.
      If you don't update your software or security patches then you can be hacked by any hacker. So you needs to update your software. 

Saturday, September 9, 2017

TOR Browser Explian. | TOR Browser


Hello friends
   As we  know that browsers are use for brows any website. When we surf any website by a browser (chrome) than our internet provider can be track us. Our IP Address is responsible for track us. Internet provider track our ip address for know our surfing.
   Tor browser is used for anonymous surfing. Any internet provider can't track us because when we use tor browser than our ip address is changed by another ip address. This ip address will hide by many layers of ip address.

 Tor browser hide our ip address by many other ip addresses like image which given below. 
As we saw in image tor browser make many ip address to hide our real ip. Our real ip is at the bottom. It is called tor browser circuit.
How hide our real ip by many other ip

Tor browser is generate a tor circuit between our network to destination server. The given below picture is show how to generate tor browser circuit.
How create tor  circuit

Monday, July 24, 2017

[HINDI] VPN ??? WHAT IS VPN???? || ABOUT VPN

About VPN

Dosto aap sabhi ne VPN ka name jaroor suna hoga ya apne mobile phone ya laptop pr VPN dekha hoga. To VPN ke bare me janne k liye mai ye likh rha hu.
VPN ka pura name hai virtual private network. Ye hmare private network ko public network use krte huye connect karta hai. VPN se ham apne offices, barnches ko connect kr skte hai, jo world me kahi v ho skte hai.
VPN se ham aisi websites ka use kr skte hai jo us country ya state k liye restricted ho.Hame us country ka VPN use krna hoga. Or fir ham us website ka use kr skte hai. jab ham dusre country ka VPN use krenge to ham us country ki tarah react krenge jaise ki ham kisi dusri country m baithe ho.or waha se ham us website ko access kr rhe ho.
VPN ke bare me or janne k liye iss video ko jaroor dekhe......

About Proxy in hindi

About Proxy-
Dosto apne proxy k bare m jaroor suna hoga. Aaj ham proxy k bare m janenge. Proxy ka work
ek mediator ki tarah hota hai. Ye ek user or web k bich m mediator ka kaam krta hai. Jb
koi website kisi dusri website ka copyright documents ko bina permission k users ko 
uplabdh krati hai to government us website ko bann kr deti hai. Aisi websites ko ham proxy
se open kr skte hai. Proxy kuchh had tk hamari identity ko chhupane m v kaam krti hai. Pr
jyada der tk hm apne identity ni chhipa skte kyoki ye ek hi layer hoti hai hmare or web k
bich m agar is proxy layer ko koi hata de to ham direct web ko access krenge or hmari IP
identify ki ja skti hai.
Proxy ka use office, colleges, cyber cafe etc. m kiya jata hai. Jaise ki kisi
college m students k liye facebook surf krna mana hota hai to uss college m facebook ki
website pr proxy lga dete hai or koi use surf nhi kr pata.
Iss tarah jo websites government dwara bann hoti hai unko ham kisi dusri country
ki proxy se open kr skte hai. Agar koi website india m bann hai to sayad china m bann na
ho or agar ham china ki proxy use kre to ham uss website tk pahuch skte hai.

About DNS DOMAIN NAME SYSTEM, DNS SPOOFING, AMPLIFICATION ATTACK in hindi

Hello friends

About DNS.....

ham baat krenge DNS k bare me ki DNS kya hota hai. DNS ka poora name hai Domain Name System. Jaisa ki apko v pta hoga ki sabhi website ki apni ek alag IP hoti hai jisse uss website ki pahchan hoti hai or uss IP address se ham uss website tk pahuch skte hai.To jab ham apne browser me kisi website ko open krte hai to hamara computer DNS server ko query bhejta hai or reply me DNS server hame uss required website ka IP address send krta hai or ham uss website ko open kr pate hai.
jaise ki ham apne browser k URL bar me 'www.google.com' search krte hai to hamara computer sbse pahle DNS server ko request send krta hai or sbse pahle ye request root DNS server k pass pahuchti hai or root server k pass bahut sare alag alag server hote hai ex.- .com,.org, .in etc. to root server inme se .com server ko pahchanta hai or query .com server ko send krta hai. Uske baad .com server k pass v bahut sare alag alag server hote hai ex.- facebook, google etc. to yaha pr google server ko choose krta hai or fr google server k pass v bahut sare server hote hai jaise ki mail.google.com. www.google.com etc. to yaha pr google server www. server ko choose krta hai or fr complete query ki information user tk pahuchata hai. or iss tarah hamara website open ho jati hai.


About DNS Spoofing.......



Dosto ab baat krte hai DNS Spoofing ki. jaisa ki abhi hamne jana ki DNS hame query ki information send krta hai to hamara v to koi prmanent address hoga jisse ki hamari pahchan ho skti hai. Means hamara v ek IP address hota hai. To agar hamara IP address koi chori kr le to jab ham kisi website ko surf krenge to hamari query uss person tk jayegi jisne ki hamari IP address ko chori kiya hai iss person ko hm hacker v bol skte hai. Or fr jab uss hacker k pass hamara address hai to fr wo hame koi v information send kr skta hai.jaise ki agar hamne facebook.com k liye query send ki hai to hamre pass wo page open hoga wo reality me facebook.com ka original page ho hi na or hacker hamse hamri sari information uss fishing page se le lega. Iss tarah se koi hacker hamari IP ko spoof krke hamri koi v information le skta hai fr chahe wo kisi facebook account ki detail ho ya fr chahe kisi bank account ki detail ho.


ABOUT DNS AMPLIFICATION ATTACK


Dosto ab ham baat krenge Amplification attack k bare me. Iska direct connection hai DNS spoofing se. Isme jo hacker hota hai wo hamari IP ko spoof krke hamari hi IP address k 4-5 computer bna leta hai or ek sath alag alag website k liye sabhi computer se DNS server ko request send krta hai. Ab DNS server ko lgta hai ki alag alag website ki information mangi gayi hai to wo sabhi websites ki information send kr deta hai. Kyoki wahi same IP hamare computer ki v hoti hai to itni sari websites ki information hamare computer me ek sath aa jati hai or fr hamara browser use smjh nhi pata hai or koi v webpage ko open nhi kr pata hai. Iss tarah ham tb tk kisi website ko open nhi kr skte jb tk ki wo Amplifiction attack hamre computer m ho rha hai.




Window Replacement Cost for Hotel Buildings in Florida

 Window Replacement Cost for Hotel Buildings in Florida Replacing windows in hotel buildings in Florida is a significant investment that en...