Skip to main content

Posts

Showing posts with the label cyber security

Hackers, Who are they and why do they do it?

Watching the typical popular media portrayal of a hacker you are likely to see a socially awkward goofy individual either working in some dark basement or high tech office with six 42" LCD screens linked together into one large screen with Matrix like code flowing across the screen as they furiously type away as they get ready to launch some world ending computer virus. Reading or watching the news is likely to be a similar fair with news of a new banking Trojan or hacker group that have stolen millions of bank account records, social security numbers, and the like. On the surface level, hackers are all really bad people that should be locked up, so why learn how to hack?   The truth is there are many different types of hackers, some of which are very important to the health and integrity of private and corporate networks.   According to the EC-Council's Certified Ethical Hacking 9 certification hackers can be classified into 8 categories:   Black Hats: Indivi...

What is GetTor?

GetTor is a service that provides alternative methods to download the Tor Browser, especially for people living in places with high levels of censorship, where access to Tor Project's website is restricted. How does it work? The idea behind GetTor is very simple: Step 1: Send a request to GetTor (gettor@torproject.org) specifying your operating system (and your locale). Ex: "windows es" Step 2: GetTor will send you back a reply with links to download Tor Browser from our supported providers. Step 3: Download Tor Browser from one of the providers. When done, check the integrity of the downloaded file by verifying its signature. Step 4: If required, get some bridges! GetTor Responder on Twitter GetTor is currently not working on Twitter. How to verify a digital signature Digital signature is a process ensuring that a certain package was generated by its developers and has not been tampered with. In GetTor emails we provide a link to a file with...

How to become a hacker | Introduction | Malyalam

ആമുഖം ഹാക്കിംഗ് _ [Click here to English] ... # ഈ അദ്ധ്യായത്തിൽ _ * ഹാക്കർ ലക്ഷ്യങ്ങൾ മനസിലാക്കുന്നു * നൈതിക ഹാക്കർമാരുടെയും ദോഷകരമായ ഹാക്കർമാരുടെയും വ്യത്യാസങ്ങൾ വ്യക്തമാക്കുന്നു * സന്മാ...