Web proxies

The most basic way to surf websites anonymously is by using Web-based proxies likeProxify, Anonymouse or Hide My Ass. Web proxies are simple and easy to use: Just head to the anonymizing website, type in the URL of the website you want to visit anonymously, and you’re off! Some even include advanced features like the ability to encrypt Read more about Web proxies[…]

What is Data Hiding?

What is Data Hiding?  Data Hiding is a very ancient art.  Caesar cipher.  Egyptians used symbolic language in their pyramids.  Coded Language.  Writing with invisible ink.  With the dawn of the Digital World, now just the Methods have changed, but the aim is still the same. What is Data Hiding ? Cont. In Modern Times, Read more about What is Data Hiding?[…]

Stakeholder agencies in India

Countering cyber crimes is a coordinated effort on the part of several agencies in the Ministry of Home Affairs and in the Ministry of Communications and Information Technology. The law enforcement agencies such as the Central Bureau of Investigation, The Intelligence Bureau, state police organizations and other specialised organizations such as the National Police Academy Read more about Stakeholder agencies in India[…]

Email spamming

Spam refers to sending of unsolicited messages in bulk. Technically, it overflows the limited-sized memory by excessively large input data. In relation to e-mail accounts, it means bombing an e-mail account with a large number of messages maybe the same or different messages Spam is an unsolicited message requiring one’s time and effort to get Read more about Email spamming[…]

Hacking(Child Pornography)

Child Pornography The Internet is extensively used for the sexual abuse of children. As more homes have access to the internet, more children are accessing it and this enhances their vulnerability to falling victim to the aggression of pedophiles. Pedophiles (a person who is sexually attracted to children) lure the children by distributing pornographic material Read more about Hacking(Child Pornography)[…]

Hacker in Ludhiana,EthiicalHacker in Ludhiana

What Are Firewall

A firewall is any device used to prevent outsiders from gaining access to your network. This device is usually a combination of software and hardware. Firewalls commonly implement exclusionary schemes or rules that sort out wanted and unwanted addresses. To understand how work firewalls; consider some of the subjects discussed earlier in this book. First, Read more about What Are Firewall[…]