Skip to main content

Posts

Showing posts from 2018

HDMI VS VGA

HDMI stand for High definition multimedia interface. HDMI is a connector with cables used  to connect High Definition TVs, Projectors, or Blu ray player it is capable  for  the transmission for the transmission of high quality and high  bandwidth of high quality and high bandwidth . It is a  stream of audio and video The Hitachi was introduce was  introduce by the multiple company like Toshiba , Hitachi , sony etc. It allows us to connect 2 device together for transmission of audio and video The HDMI run from 1 foot to  50 feet in all direction  HDMI  port are found in the different part of computer like video card and mother board but mainly not in all computer have HDMI in video card or mother board.  VS  ===_ VGA (Video Graphic Array)  This  VGA is a computer display standard is about 640 by 480 resolutions . Display resolution is a 15 pins video connector  VGA is  display hardware ...

The best 2018 wifi hacking method Vulnerable to KRACK Attacks

' All wifi networks' are vulnerable to hacking, security expert discovers  WPA2 protocol used by vast majority of wifi connections has been broken by Belgian researchers, highlighting potential for internet traffic to be exposed RACK (Key Reinstallation Attacks) is a security vulnerability that targets a key step in the Wi-Fi authentication protocol to break security encryption. KRACK may affect mobile computers, phones, and other IoT devices running both Android and Windows operating systems. If your device supports Wi-Fi, it is most likely affected.To address the KRACK security vulnerability, Zebra recommends installing the most current software update for your device. 

How To Become A Hacker ?

The main requirements to become a hacker are competence (skills), attitude and style. 1. Skills Learn how to program.It is the fundamental hacking skill. It means you’ll have to learn a programming language. Preferably more than one, you can learn a lot by comparing two languages and look for similarities and differences in the way they handle a situation. But programming is more than writing code. Learn to run an operating system. The Hacker community is much Unix/Linux oriented these days. There are several reasons, an important one being that with open-source. Unixes you get the code as well. You can actually read how the operating system is written, you can get to know it well enough to modify if you want to. Unix / Linux is also very network/internet oriented, learning to understand Unix / Linux will help for the next skill you’ll need to acquire. And it comes with free programming tools. Learn about data communication and networks Learn how to...

What is SCADA?

The ever-changing world continues to bring with its evolution numerous accomplishments and challenges. In the last decade alone, we have created a network infrastructure of almost infinite proportions in which we communicate today. The IP cloud covers us all, and truly understanding its philosophical transparency and our critical dependence on its services could be a complex feat. Almost everything is connected to the vast realm of the Internet, and SCADA devices are no exception. The migration of the SCADA infrastructure from legacy to IP brings with it the relative ease of remote management and connectivity, but also the possible burden of network attacks and sabotage. SCADA stands for supervisory control and data acquisition. SCADA networks control and monitor the critical utility and process control infrastructures for manufacturing, production, and power generation for utility companies, including electricity, natural gas, oil, water, sewage, and railro...

What Is a WiFi Pineapple and How Is It Used?

There are many reasons why a WiFi Pineapple might come in handy. With the ability to scan, target, intercept, and report, WiFi Pineapples are easily (and effectively) multi-talented. The general idea of a WiFi Pineapple is providing a middle man between the internet and whatever device is up for target. With the ability to fake a “remembered network”, the victim will scan for networks and see the usual results. The only difference: one of them will covertly belong to the WiFi Pineapple. When the victim connects to the disguised network, their device’s traffic can officially be intercepted by the handler of the advanced tool. This makes it very easy to execute man in the middle attacks . On the other hand, malicious intent is not the only use of a WiFi Pineapple. On the official WiFi Pineapple website , they list all of the included features: WiFi man-in-the-middle platform Highly effective rogue AP suite Over-the-air apps and modules Advanced clien...

how the web works ?

When you visit a website, the web server hosting that site could be anywhere in the world. In order for you to find the location of the web server, your browser will first connect to a Domain Name System (DNS) server On this page you can see examples that demonstrate how the web server that hosts the website you are visiting can be anywhere in the world. It is the DNS servers that tell your browser how to find the website. A user in Barcelona visits  sony.jp in Tokyo A user in New York visits   google.com in San Francisco A user in Stockholm visits  qantas.com.au in Sydney A user in Vancouver visits  airindia.in in Bangalore On the right you can see what happens when a web user in England wants to view the website of the Louvre art gallery in France which is located at www.louvre.fr. Firstly, the browser in Cambridge contacts a DNS server in London. The DNS server then tells the browser the location of the web server hosting the site in Paris...