Posts

Showing posts from August, 2018

How secure your OTP ( one-time password ) is | Read this article and think twice

Image
No matter if you are a online banking or a mobile banking user, a gmail account user or a facebook account user we all are familiar with the word OTP ( one-time password ). Yes it is the password that gives your online banking or your social networking account a much more better security that we had before. Now a day one-time password ( OTP ) are most popular feature of most of the Banks through which a user verifies its identity using OTP that has been sent to their registered mobile number that they had provided to the bank at the time of account opening in the bank. Not only the banks but also the Social Networking Services like Facebook, Email Services like Gmail started using OTP ( one-time password ) as a two step verification to help their users to secure it from the hackers. With no doubt OTP ( one-time password ) is secure cause when you try to log in to your online bank service or to a shopping website or to your social networking website first you need to fill up your email

What is Ethical Hacker and Ethical Hacking | Read this article to get the real answer

Image
When we hear the word Hacker the first thing that comes into mind is a bad person who generally hack into our system or network to steal important data or to harm our system but Ethical Hacking or Ethical Hacker these terms are used to describe a type of hacking performed by an individual or a company to identify potential threats on a computer or a computer network. These kind of Hackers attempt to bypass all kinds of system security and search for all the weakness that could be used by the bad hacker community often called THE BLACK HAT HACKERS. These information then used by the organizations to improve their Security. TYPES OF HACKING  There are different types of hacking in the list : 1. Computer Hacking - Here different types of method used by hackers to get access and steal confidential data from a system. 2. Network Hacking - Here hackers use different type of tools to gather information about a particular network and destroy the network system or steal data from different co