Techie Talks
-
Black Hat
Malicious Insider Threats
Malicious Insider Threats: One of the most dangerous threats to any network is an insider who is intent on doing…
Read More » -
Black Hat
Managing Spam to Avoid Viruses
Managing Spam to Avoid Viruses: Although spam is not truly a virus or a hoax, it is one of the…
Read More » -
Black Hat
How Viruses Work
How Viruses Work: A virus, in most cases, tries to accomplish one of two things: render your system inoperable or…
Read More » -
Location Finder
Finding the IP address of a Website
Finding the IP Address of a Website: This exercise will show you how to obtain the information about a website…
Read More » -
Black Hat
Intrusion Prevention and Intrusion Detection Systems
Intrusion prevention & Intrusion detection systems: Intrusion prevention system (IPSs) and intrusion detection systems (IDSs) are important considerations for any…
Read More » -
Black Hat
Hacking: Generic Example of Cyber Crime
Generic Examples of Cyber Crime: Hacking is by no means a new phenomenon; it has existed in one form or…
Read More » -
Black Hat
Hacking: Fun or Criminal Activity?
Hacking Fun or Criminal Activity: As stated earlier, hacking is by no means a new phenomenon; it has existed in…
Read More » -
Code of Conduct
Code of Conduct and Ethics
Code of Conduct and Ethics: As an ethical hacker you will need to make sure that you adhere to a…
Read More » -
Black Hat
The Evolution and Growth of Hacking
The Evolution and Growth of Hacking: As you will see that attacks and strategies have improved and evolved over the…
Read More »
