Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
This presentation is made for my college presentation of explaining "Threats, Vulnerabilities & Security measures in Linux' and also suggestion how you could enhance ur Linux OS security.
Hacking , Types of Hackers, Purpose of Hacking, Motives Evil and to destroy and many more. Tools used by hackers in hacking the systems. Conferences held for hackers to know about recent activities and new ways.
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
This presentation is made for my college presentation of explaining "Threats, Vulnerabilities & Security measures in Linux' and also suggestion how you could enhance ur Linux OS security.
Hacking , Types of Hackers, Purpose of Hacking, Motives Evil and to destroy and many more. Tools used by hackers in hacking the systems. Conferences held for hackers to know about recent activities and new ways.
The project entitled with “Network Security System” is related to hacking attacks in computer systems over internet. In today’s world many of the computer systems and servers are not secure because of increasing the hacking attacks or hackers with growing information, so information security specialist’s requirement has gone high.
Cybersecurity Free Tools for Practice Project.pdfHaris Chughtai
Compiled list of free tools and software that can be used to practice your Cybersecurity knowledge
There are hyperlinks in the deck for quick access to useful information, you will have to download it to have links available to you.
Abstract
Application sandboxes allow developers to take an unusual stance: not that our systems will be bug-free, and that bugs should be considered the corner-case; but that in fact there will be bugs, bugs as the rule, bugs that will be exploited in the messiest, ugliest way.
(I won't mention current events. But we'll know what they are...)
For this talk, I propose speaking about the design of a CGI framework that assumes exactly that: that its network-touching components will be exploited.
After all, CGI frameworks have a celestially vast attack surface: URL query strings; cookies and HTTP headers; and beneath and beyond it all, form parsing. Combine these attack vectors with validation--at best validation of simple types, and then more terrifyingly (and normally) via external libraries such as libpng.
In reviewing CGI frameworks in C for some recent work, I noticed less a lack of security focus than a parade committee for exploits. Even given my own small demands for CGI security, I was led to asked myself: can I do better than this?
The topic would necessarily focus on available sandbox techniques (e.g., systrace, Capsicum) and their practical pros and cons (portability, ease of implementation, documentation, etc.). After all, if we make mistakes in deploying our sandbox, it's just more ticker-tape for the parade.
The CGI framework in question, kcgi, is one I use for my own small purposes. Obviously it's ISC-licensed, well-documented C code, and will be mentioned as little as possible beyond as an exemplar of how easy (or hard!) it can be to write portable sandboxes. In short, this isn't about kcgi, but about systrace, Capsicum, Darwin's sandbox, and so on.
Speaker bio
Most of my open-source work focusses on UNIX documentation, e.g., the mandoc suite (now captained by schwarze@) and its constellation of related tools, such as pod2mdoc, docbook2mdoc, etc. Earlier work focussed more on security, from the experimental mult kernel container on OpenBSD and NetBSD to sysjail. In general, I dislike computers and enjoy the sea.
Creating HAGRAT, A Remote Access Tool (RAT) and the related Command and Control (C2) infrastructure for Penetration Testing exercises that simlate persistent, targeted attacks.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
More Related Content
Similar to powe point presentation on kali linux and ethical hacking
The project entitled with “Network Security System” is related to hacking attacks in computer systems over internet. In today’s world many of the computer systems and servers are not secure because of increasing the hacking attacks or hackers with growing information, so information security specialist’s requirement has gone high.
Cybersecurity Free Tools for Practice Project.pdfHaris Chughtai
Compiled list of free tools and software that can be used to practice your Cybersecurity knowledge
There are hyperlinks in the deck for quick access to useful information, you will have to download it to have links available to you.
Abstract
Application sandboxes allow developers to take an unusual stance: not that our systems will be bug-free, and that bugs should be considered the corner-case; but that in fact there will be bugs, bugs as the rule, bugs that will be exploited in the messiest, ugliest way.
(I won't mention current events. But we'll know what they are...)
For this talk, I propose speaking about the design of a CGI framework that assumes exactly that: that its network-touching components will be exploited.
After all, CGI frameworks have a celestially vast attack surface: URL query strings; cookies and HTTP headers; and beneath and beyond it all, form parsing. Combine these attack vectors with validation--at best validation of simple types, and then more terrifyingly (and normally) via external libraries such as libpng.
In reviewing CGI frameworks in C for some recent work, I noticed less a lack of security focus than a parade committee for exploits. Even given my own small demands for CGI security, I was led to asked myself: can I do better than this?
The topic would necessarily focus on available sandbox techniques (e.g., systrace, Capsicum) and their practical pros and cons (portability, ease of implementation, documentation, etc.). After all, if we make mistakes in deploying our sandbox, it's just more ticker-tape for the parade.
The CGI framework in question, kcgi, is one I use for my own small purposes. Obviously it's ISC-licensed, well-documented C code, and will be mentioned as little as possible beyond as an exemplar of how easy (or hard!) it can be to write portable sandboxes. In short, this isn't about kcgi, but about systrace, Capsicum, Darwin's sandbox, and so on.
Speaker bio
Most of my open-source work focusses on UNIX documentation, e.g., the mandoc suite (now captained by schwarze@) and its constellation of related tools, such as pod2mdoc, docbook2mdoc, etc. Earlier work focussed more on security, from the experimental mult kernel container on OpenBSD and NetBSD to sysjail. In general, I dislike computers and enjoy the sea.
Creating HAGRAT, A Remote Access Tool (RAT) and the related Command and Control (C2) infrastructure for Penetration Testing exercises that simlate persistent, targeted attacks.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Why React Native as a Strategic Advantage for Startup Innovation.pdfayushiqss
Do you know that React Native is being increasingly adopted by startups as well as big companies in the mobile app development industry? Big names like Facebook, Instagram, and Pinterest have already integrated this robust open-source framework.
In fact, according to a report by Statista, the number of React Native developers has been steadily increasing over the years, reaching an estimated 1.9 million by the end of 2024. This means that the demand for this framework in the job market has been growing making it a valuable skill.
But what makes React Native so popular for mobile application development? It offers excellent cross-platform capabilities among other benefits. This way, with React Native, developers can write code once and run it on both iOS and Android devices thus saving time and resources leading to shorter development cycles hence faster time-to-market for your app.
Let’s take the example of a startup, which wanted to release their app on both iOS and Android at once. Through the use of React Native they managed to create an app and bring it into the market within a very short period. This helped them gain an advantage over their competitors because they had access to a large user base who were able to generate revenue quickly for them.
Strategies for Successful Data Migration Tools.pptxvarshanayak241
Data migration is a complex but essential task for organizations aiming to modernize their IT infrastructure and leverage new technologies. By understanding common challenges and implementing these strategies, businesses can achieve a successful migration with minimal disruption. Data Migration Tool like Ask On Data play a pivotal role in this journey, offering features that streamline the process, ensure data integrity, and maintain security. With the right approach and tools, organizations can turn the challenge of data migration into an opportunity for growth and innovation.
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
Modern design is crucial in today's digital environment, and this is especially true for SharePoint intranets. The design of these digital hubs is critical to user engagement and productivity enhancement. They are the cornerstone of internal collaboration and interaction within enterprises.
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
2. Origin of an OS: From UNIX to Kali Linux
Linux Architectures and Ubiquity
What is Kali and why should I use it?
Kali’s New Features
Kali’s Toolkit
Installing Kali
Summary
3. 1968: E.W Dijkstra develops MULTICS (Multiplexed
Information and Computing Service) in the Netherlands
1969: Bell telephone (AT&T) lab researcher Ken
Thompson developed a new system using MULTICS as
part of a team. His coworker Brian Kernighan dubbed it
UNICS (UNiplexed Information and Computing
Service). It was later changed to UNIX.
Milestone: The UNIX operating system was born.
4. 1969-1973: Bell Telephone researcher Dennis Richie
develops the C language as a systems programming
language for UNIX.
1970s: UNIX versions 6 and 7 were developed, first in
B and Assembly than C. Originally for academic use,
later sold to vendors.
1987: A Unix-like system based on microkernel design
known as MINIX was developed.
Milestone: C language developed.
5. 1980s-1990s: The “UNIX Wars” occur, vendors
struggle to standardize UNIX.
1991:Linus Torvalds developed a new operating system
called Linux, which is similar to MINIX.
1990s-Today: Various UNIX and UNIX/Linux-like
distributions are released, such as: GNU, OS X,
Debian, and Ubuntu.
Milestone: Linux was born.
6. 2006: Linux distribution BackTrack was released by
Offensive Security. It becomes the definitive Penetration
Testing platform available.
2012: The final BackTrack version, Backtrack 5 R3, is
released.
2013: Kali Linux, a.k.a. BackTrack 6, is released by
Offensive Security.
Milestones: BackTrack is born, then Kali.
7.
8.
9.
10.
11. Kali Linux is an advanced Penetration Testing
and Security Auditing Linux distribution
(distro). Named after a Hindu god.
It was designed to replace the BackTrack
Linux distro.
A Linux distro is a operating system based off
the Linux kernel.
Think Windows NT and all the Windows
distributions (XP, Vista, 7, 8, etc.)
Linux is itself based off the UNIX kernel.
UNIX > Linux > BackTrack > Kali.
12.
13.
14. It is FREE!!!!!
300+ applications, from password crackers to
digital forensics software.
Vast wireless device support (ARM processors).
Completely Customizable.
Multilingual Support.
Secure Development Environment.
Open source Git tree.
Filesystem Hierarchy Standard (FHS) Compliant.
Gnu Privacy Guard (GPG) secure signed packages
and repos.
15. Switched from Ubuntu to Debian.
FHS and Debian compliant.
Can now bootstrap and customize Kali ISOs.
Streaming security and package updates from
Debian.
Expanded ARM development.
16. Easy upgrade to future versions.
Customizable desktop environment.
Automatable Kali Installations.
Streamlined Development Process.
Long Term Tool Packaging and Maintenance.
18. Via Physical Media Via Digital Media
Burn to a live disk,
insert into disk drive,
install.
Format a flash drive,
install Kali Linux on it,
insert into a computer,
at BIOS screen select
boot from USB.
Download VMware or
other similar software,
create a virtual machine,
download and install Kali
Linux onto virtual
machine.
Use a Preboot eXecution
Environment (PXE) to
install and boot Kali
Linux from a
server/client network.
19. Bell Telephone (AT&T)’s UNIX > Linus
Torvalds's Linux > Offensive Security’s Linux
Distribution BackTrack > Kali Linux a.k.a.
BackTrack 6.
Kali is the premier operating system for
Penetration Testing and other related uses.
Kali was built from the ground up to replace
BackTrack.
There are many platforms and installation
methods that are Kali-compatible.
20. Admin. "Brief History of Unix and Linux Operating Systems."
More Process, 18 Oct. 2013. Web. 23 Sept. 2014.
Aharoni, Mati. "Kali Linux | Rebirth of BackTrack, the Penetration
Testing Distribution." Kali Linux. Offensive Security, 25 Aug.
2014. Web. 23 Sept. 2014.
Cimafranca, Dominque M. "Architecture Of The Linux Kernel."
Architecture Of The Linux Kernel. Ateneo De Davao Universit, 13
Aug. 2009. Web. 23 Sept. 2014.
“Backtrack vs Kali." Diffen.com. Diffen LLC, n.d. Web. 23 Sep
2014.
"Linux vs Unix." Diffen.com. Diffen LLC, n.d. Web. 23 Sep 2014.
Wikipedia. "BackTrack." Wikipedia. Wikimedia Foundation, 23
Sept. 2014. Web. 23 Sept. 2014.
Wikipedia. "Linux." Wikipedia. Wikimedia Foundation, 23 Sept.
2014. Web. 23 Sept. 2014.
Wikipedia. “UNIX." Wikipedia. Wikimedia Foundation, 23 Sept.
2014. Web. 23 Sept. 2014.
22. Introduction
Ethical Hacking
Hackers
Types of Hackers
Hacking Process
Why do We need Ethical Hacking
Required Skills of an Ethical Hacker
23. What do hackers do after Hacking?
Advantages
Disadvantages
Future Enhancements
Conclusion
24. Ethical hacking also known as penetration testing or
white-hat hacking, involves the same tools, tricks, and
techniques that hackers use, but with one major difference that
Ethical hacking is legal.
Ethical hacking, is legally breaking into computers and
devices to test an organization's defenses.
25. Independent computer security Professionals breaking into the
computer systems.
Neither damage the target systems nor steal information.
Evaluate target systems security and report back to owners
about the vulnerabilities found.
26. A person who enjoys learning details of a
programming language or system
A person who enjoys actually doing the
programming rather than just theorizing about it
A person capable of appreciating someone else's
hacking
A person who picks up programming quickly
A person who is an expert at a particular programming
language or system
27. Black Hat Hacker
White Hat Hacker
Grey Hat Hacker
28. A black hat hackers or crackers are individuals with
extraordinary computing skills, resorting to malicious or
destructive activities.
That is black hat hackers use their knowledge and skill for
their own personal gains probably by hurting others.
29. White hat hackers are those individuals professing
hacker skills and using them for defensive purposes.
This means that the white hat hackers use their
knowledge and skill for the good of others and for the
common good.
30. These are individuals who work both offensively and
defensively at various times.
We cannot predict their behavior.
Sometimes they use their skills for the common good while in
some other times he uses them for their personal gains.
37. Microsoft: skills in operation, configuration and management.
Linux: knowledge of Linux/Unix; security setting,
configuration, and services.
Firewalls: configurations, and operation of intrusion detection
systems.
38. Routers: knowledge of routers, routing protocols, and access
control lists
Mainframes
Network Protocols: TCP/IP; how they function and can be
manipulated.
Project Management: leading, planning, organizing, and
controlling a penetration testing team.
39. Patch Security hole
The other hackers can’t intrude
Clear logs and hide themselves
Install rootkit ( backdoor )
The hacker who hacked the system can use the
system later
It contains trojan virus, and so on
Install irc related program
identd, irc, bitchx, eggdrop, bnc
40. Install scanner program
mscan, sscan, nmap
Install exploit program
Install denial of service program
Use all of installed programs silently
41. ‘’To catch a thief you have to think like a thief”
Helps in closing the open holes in the system network
Provides security to banking and financial establishments
Prevents website defacements
An evolving technique
42. All depends upon the trustworthiness of the ethical hacker
Hiring professionals is expensive.
43. As it an evolving branch the scope of enhancement in
technology is immense.
No ethical hacker can ensure the system security by using the
same technique repeatedly.
More enhanced software’s should be used for optimum
protection.
44. In the preceding sections we saw the methodology of hacking,
why should we aware of hacking and some tools which a
hacker may use.
Now we can see what can we do against hacking or to protect
ourselves from hacking.
The first thing we should do is to keep ourselves updated
about those software’s we and using for official and reliable
sources.
Educate the employees and the users against black hat
hacking.