IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Better Security by Thinking as a Hacker

23 October 2007 By Saran

The best way to find out the security breaches is to think like a hacker on how to penetrate a secure network through various means. Accessibility to servers may have to go through different stages since various encrypted usernames and passwords would stand in the way of a successful hack.

Network Hacker

The approach is quite simple. It is a reverse psychology of sorts since to become a full-proof secure system, ways on how to be able to get over the fences for such walls that have been put off must be severely tested.

Unorthodox as it may seem, the various approaches to be done will certainly be simple at this point because at the rate that hackers are able to go around security fences today, a lot of progress has been made in being able to make the lives of administrators a living hell as far as IT security is concerned.

[tags]hacker, network security, breach, coding, cracks, cryptography[/tags]

Filed Under: Cryptography, IT Security Basics, Network Security, Operating Systems, Privacy & Anonymity, Programming, Real-World Issues, Security Policies, Spyware Tagged With: breach, coding, cracks, Cryptography, hacker, Network Security, security

Breaking Codes, Breaking Rules… Is it Prestige or Trouble?

5 March 2007 By Saran

Hackers, code breakers and some people who want to try out their best interest in the line of penetrating the supposedly well-secured network infrastructures that large business empires have on the web will always be the target of people who want to prove a point on their capacity to override such challenging securities.

Code Breakers and Hackers

To programmers and people who are up to date with technology, such an outlook can be fulfilling to their curious personality aspect but could also be asking for trouble. Breaching security walls is like intruding in high voltage areas where people would never experience a normal life once again once they are caught.

Hackers and code breaking individuals have made it a point to try their hand in determining up to which content they can call themselves geeks or nerds in technology and breaking a password or security id is something that is definitely up for them to consider. But hopefully, they would know the consequences for such as privacy of their lives may eventually become intruded in the future as well.

[tags]hackers, security, network, coding, code breaker[/tags]

Filed Under: IT Security Basics, Network Security, Physical Security, Privacy & Anonymity, Real-World Issues, Security Policies, Tips Tagged With: code-breaker, coding, hackers, network, security

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security