Tips and Tricks

One CLICKER Of A Button And You Can Watch Favorite New Or Old TV Shows From Your PC Or Smartphone

cycoshas

Clicker is often viewed as an Internet TV site, but in all honesty it is anything but. The best way to describe Clicker is as an online content aggregator, which still provides you access to your favorite TV shows, old or new. The site itself doesn’t actually host any TV videos, but you will be directed to a site that will have the specific video that you want to watch. They provide an extremely extensive list of TV shows, so it makes no difference how obscure the program is that you want to watch, you are likely to find it.…

Read More

List

List of Sites where You Can Sell Your Website , Apps And Domain

cycoshas

Hardly do you get to see someone in the present era of internet and technology who doesn’t know about Making money online, Everyone is making money in his own way, Here i am sharing Model of making Money which is  less competitive, and give you good chance to make quick Money. Many of you already know about this, so for those who already know about this, this article give you more option or you can say alternatives. Many of people making a blog and try to monetize it but some how not get success in blogging or get engaged in…

Read More

ABC of Ethical Hacking

How to learn Ethical hacking Freely

cycoshas

Ethical hacking Overview , This post is belongs to the module of How to learn Ethical hacking Freely Here you learn what is the role of an ethical hacker and what you can and what you cannot do as an ethical hacker.One more thing i want to mention that It Takes Time to Become a Hacker. So have pateince and google is the best way you can learn. Hacking is a hobby, a lifestyle, and an attitude , A drive to figure out how things work.Before Starting you must know about what is hacking and the type Of hackers.

ABC of Ethical Hacking

Types of hacker

cycoshas

Types of hacker !! Several subgroups of the computer underground with different attitudes and aims use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie. A Cracker or Cracking is to “gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system”. These subgroups may also be defined by the legal status of their activities.

ABC of Ethical Hacking

Hacking – Tips for Learner

cycoshas

Many people on net impressed by the word “hacking” might do a little search on google about learning hacking. No doubt, they are at the right place. I would have rather use words – they are on the right track but will they open up the right door and gain something or they will just end up becoming a victim them self.

ABC of Ethical Hacking

Ethical Hacking – how to start learn hacking ?

cycoshas

As many of newbies asking this quetion so for all these people who are new at this whole Scenerio and do not really understand what hacking is all about and where to begin, I offer up these links to some great places to start learning. News: www.digg.com www.slashdot.org Presentations: http://www.lessig.org/freeculture/free.html  <– A speech given talking all about the problems facing culture when dealing with copyright and other digital laws. Podcasts: http://www.grc.com/SecurityNow.htm <– This is fantastic for people who are new to the field.  If you have the time or motivation, go back and listen to them from day 1, they assume you…

Read More

ABC of Ethical Hacking

List of Top 5 Ethical Hacking Course

cycoshas

List of Top 5 Ethical Hacking Course One of my reader ask me about Ethical courses so i try to put little info about top 5 ethical hacking course.And its also a first module on How To Learn Ethical Hacking   CEH (Certified Ethical Hacker) The Certified Ethcial Hacker is a professional certification provided by EC-Concil. EC-council is world’s largest computer security certification provider organisation.A  Certified Ethical Hacker has obtained a certification in how to look for the vulnerabilities in the target systems and uses the same knowledge and tools. A Starting Salary of a Certified Ethical Hacker according to…

Read More

ABC of Ethical Hacking, Knowledge

How to bye pass Firewall 2

cycoshas

Welcome back in section of How to bye pass firewall. Earlier we discuss about Identification of Firewall in post How to bye pass Firewall. In this post we discuss about tools to bye pass the firewall and study about Its technique. Breaching Firewalls One of the easiest and most common ways for an attacker to slip by a firewall is by installing network software on an internal system, which communicates by using a port address permitted by the firewall’s configuration A popular port is TCP port 80, which is normally used by web server Many firewalls permit traffic using port…

Read More

ABC of Ethical Hacking, Knowledge

How to bye pass Firewall

cycoshas

How to bye pass Firewall To bye pass the Firewall you must know the firewall identification means full information about Firewall like type , version , and rules of almost every firewall on a Network. These are three technique for Firewall Identification   Port scanning Firewalking Banner grabbing Port Scanning (How to bye pass Firewall) Some firewalls have obvious signatures Check Point’s FireWall-1 listens on TCP ports 256, 257, 258, and 259 Check Point NG listens on TCP ports 18210, 18211, 18186, 18190, 18191, and 18192 as well Microsoft’s Proxy Server usually listens on TCP ports 1080 and 1745 Here…

Read More

ABC of Ethical Hacking, Knowledge

FIREWALL

cycoshas

This post  will familiarize you with Firewall , bypass the firewall and tools to bye pass it. WHAT IS FIRE WALL? A hardware device and/or software program which sits between the Internet and the intranet, internet, of an organization It restricts information that comes to your computer from other computers, giving you more control over the data on your computer and providing a line of defense against people or programs that try to connect to your computer without invitation. In fact, that’s why its called a firewall. Its job is similar to a physical firewall that keeps a fire from…

Read More