Posts

Showing posts from March, 2022

is ethical hacking illegal or legal

Ethical hacking is completely legal and is one of the highest paid, fastest growing professions in information technology today. Often, an ethical hacker would work as an employee in an organization, a security firm or as an independent security consultant.

hacking is illegal under what ?

Section 66 of the IT Act deals with the offence of computer hacking. In simple words, hacking is accessing of a computer system without the express or implied permission of the owner of that computer system.

Why artificial intelligence is important in modern world?

Why artificial intelligence is important in modern world? AI technology is important because it enables human capabilities – understanding, reasoning, planning, communication and perception – to be undertaken by software increasingly effectively, efficiently and at low cost

who is the father of artificial intelligence

Who is the father of artificial intelligence? "John McCarthy" Abstract: If John McCarthy, the father of AI, were to coin a new phrase for "artificial intelligence" today, he would probably use "computational intelligence." McCarthy is not just the father of AI, he is also the inventor of the Lisp (list processing) language.

what is the effect of artificial intelligence in our life ?

How artificial intelligence can affect our life? Artificial intelligence can dramatically improve the efficiencies of our workplaces and can augment the work humans can do. When AI takes over repetitive or dangerous tasks, it frees up the human workforce to do work they are better equipped for—tasks that involve creativity and empathy among others.

What is artificial intelligence and how it works?

What is artificial intelligence and how it works? Artificial intelligence uses machine learning to mimic human intelligence. The computer has to learn how to respond to certain actions, so it uses algorithms and historical data to create something called a propensity model. Propensity models will then start making predictions (like scoring leads or something).

what is Artificial intelligence (Ai)

introduction to ai means. What is artificial intelligence AI? Artificial intelligence (AI) is the ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans because they require human intelligence and discernment.

Who has the strongest Cyber Army?

Who has the strongest Cyber Army? Cyber defense power: China is ranked number one in this category, followed by the Netherlands and France, then the United States and Canada. Additional cyber power categories: Researchers concluded that the United States leads in cyber offense, influencing cyber norms, and cyber intelligence.

what chineese hackers do ?

What Chinese hackers do? Chinese hacking groups are increasingly “sharing malware, exploits and coordinating their efforts,” the operators of “Intrusion Truth” wrote in an email. The operators have not disclosed their identities, citing the sensitivity of their work.

which countries has most dangerous hackers?

1. China 41 percent (of the world's attack traffic) 2. U.S. 10 percent 3. Turkey 4.7 percent 4. Russia 4.3 percent 5. Taiwan 3.7 percent 6. Brazil 3.3 percent 7. Romania 2.8 percent 8. India 2.3 percent 9. Italy 1.6 percent 10. Hungary 1.4 percent

Top 10 most Notorious hackers in the world ?

"Kevin Mitnick" A seminal figure in American hacking, Kevin Mitnick got his career start as a teen. In 1981, he was charged with stealing computer manuals from Pacific Bell. In 1982, he hacked the North American Defense Command (NORAD), an achievement that inspired the 1983 film War Games. In 1989, he hacked Digital Equipment Corporation's (DEC) network and made copies of their software. Because DEC was a leading computer manufacturer at the time, this act put Mitnick on the map. He was later arrested, convicted and sent to prison. During his conditional release, he hacked Pacific Bell's voicemail systems. Throughout his hacking career, Mitnick never exploited the access and data he obtained. It's widely believed that he once obtained full control of Pacific Bell's network simply to prove it could be done. A warrant was issued for his arrest for the Pacific Bell incident, but Mitnick fled and lived in hiding for more than two years. When caught, he served tim...

who hacked google in pakistan ?

Rafay Baloch hacked google in pakistan Rafay Baloch (, born 5 February 1993) is a Pakistani ethical hacker and security researcher known for his discovery of vulnerabilities on the Android operating system. He has been featured and known by both national and international media and publications[1][2] like Forbes,[3] BBC,[4] The Wall Street Journal,[5] and The Express Tribune.[1] He has been listed among the "Top 5 Ethical Hackers of 2014" by CheckMarx.[1][6] Subsequently he was listed as one of "The 15 Most Successful Ethical Hackers WorldWide"[7] and among "Top 25 Threat Seekers" [8] by SCmagazine. Baloch has also been added in TechJuice 25 under 25 list for the year 2016 and got 13th rank in the list of high achievers.[9] Reflectiz, a cyber security company, released the list of "Top-21 Cybersecurity Experts You Must Follow on Twitter in 2021" recognizing Rafay Baloch as the top influencer. what are the qualifications of "Rafay BAloch...

how much does a blackHAt hacker Earn?

it depends on hackers mindset because a whitehat hacker earns 40 lakh per annum , but when the thing comes in blackhat hacker it may be earn on her mind like its her choice it can hack at the time and earn money!

how much does a hacker earn ?

How much do hackers earn? The Certified Ethical Hacker salary in India for freshers starts from ₹3.5 LPA. If you break it down, the average salary of an Ethical Hacker in India turns out to be between ₹29k and ₹41k per month.

who hack NASA in india ?

Who Hacked NASA in India? Ankit Fadia (born 1985) is an Indian author, speaker, television host, a security charlatan, and self-proclaimed white-hat computer hacker.

how hack 'NASA' in 1999

Who hacked NASA in 1999? Jonathan James A 15-year old with a PC hacked Nasa in 1999. Between August and October of 1999, Jonathan James used his skills as a hacker to intercept data from the Defense Threat Reduction Agency or DTRA (a division of the US department Of defense). He had access to over 3,000 messages, usernames and passwords of DTRA employees.

who hack the "NASA" ?

most of the people says that 16 years old boy hacked nasa or little one too but ,according to me gMckinnon Alleged crime. McKinnon was accused of hacking into 97 United States military and NASA computers over a 13-month period between February 2001 and March 2002, at the house of his girlfriend's aunt in London, using the name 'Solo'.

who is the number 1 hacker in the world

Who is the No 1 hacker in world? Kevin Mitnick, the world's most famous hacker, will use live demonstrations to illustrate how cyber criminals take advantage of your employee's trust through the art of social engineering.

which thing protect you from hackers?

What protects your system from hackers? "Firewalls" (A firewall is a software program or piece of hardware that blocks hackers from entering and using your computer. Hackers search the internet the way some telemarketers automatically dial random phone numbers.)

what is the purpose of hacking ?

What is the purpose of hackers? A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.

What are the advantages of hackers?

What are the advantages of hackers? !Advantages of Hacking !To recover lost information, especially in case you lost your password. !To perform penetration testing to strengthen computer and network security. !To put adequate preventative measures in place to prevent security breaches.

python or c++ which is better?

Is Python or C++ better? Overall Python is better than C++ in terms of its simplicity and easy syntax. But C++ is better in terms of performance, speed, vast application areas, etc.

what is python?

What is Python used for? Python is commonly used for developing websites and software, task automation, data analysis, and data visualization. Since it's relatively easy to learn, Python has been adopted by many non-programmers such as accountants and scientists, for a variety of everyday tasks, like organizing finances its also used for hacking!

which languages are required for hacking?

Python. Exploit Writing: Python is a general-purpose programming language and used extensively for exploit writing in the field of hacking. ... JavaScript. Web Hacking: Currently, JavaScript is one of the best programming languages for hacking web applications. ... PHP. ... SQL. ... C Programming.

is your compter hacked ?

Is my computer hacked? If your computer is hacked, you might notice some of the following symptoms: Frequent pop-up windows, especially the ones that encourage you to visit unusual sites, or download antivirus or other software. Changes to your home page. Mass emails being sent from your email account

can hackers see your search history

Can hackers see your search history? A hacker can use attacks to see your browser history, login information, financial data, and more. in this world nothing can impossible!

is my bank account safe from hackers ?

Is my bank account safe from hackers? Your bank account is one of the most important things in your life to protect from hackers. Without strong cybersecurity, you could end up losing money and critical personal data. If you haven't given your online bank accounts a security checkup, now's the time.

can antivirus stop hackers ?

Can antivirus stop hackers? Image result for how can i stay safe from hackers Yes, antivirus software is a crucial part of protecting our digital security and, ultimately, defending ourselves against hackers. Antivirus immunizes our computers against unauthorized software or coding that can threaten our operating system and, most importantly, our personal data but not wholy if the hacker is outstanding coder than surely no one can stop him!!

how can we stay safe from hackers ? tips and tricks!

What can be used to protect against hacker? 6 Ways to Protect Yourself From Hackers Don't access personal or financial data with public Wi-Fi. ... Turn off anything you don't need. ... Choose your apps wisely. ... Use a password, lock code or encryption. ... Be skeptical about links and attachments. ... Trace or erase. 7 tips ways to protect yourself from hackers Tip #1: Use strong passwords. ... Tip #2: Keep software updated. ... Tip #3: Install antivirus protection. ... Tip #4: If you are not absolutely sure what an attachment is, don't open it. ... Tip #5: Be wary of unsolicited offers. ... Tip #6: Use encryption technology.

what hackers want from us ?

What do most hackers want? Social security numbers are the main target - they are worth much more to identity thieves to commit miscellaneous crimes pretending to be someone else. Hackers can open new credit and bank accounts, commit tax fraud, access brokerage accounts, get medical treatment or even apply for various benefits. Hackers have targeted personal information and financial data for a long time because they are easy to sell. Health care data has become a big attraction for data thieves in recent years. In some cases the motivation is extortion

what are the types of hackers ? briefly descriBe!!

!White Hat Hackers !Black Hat Hackers !Gray Hat Hackers !Script Kiddies !Green Hat Hackers !Blue Hat Hackers !Red Hat Hackers !State/Nation Sponsored Hackers !Hacktivist !Malicious insider or Whistleblower 1) White Hat Hackers White hat hackers are types of hackers who’re professionals with expertise in cybersecurity. They are authorized or certified to hack the systems. These White Hat Hackers work for governments or organizations by getting into the system. They hack the system from the loopholes in the cybersecurity of the organization. This hacking is done to test the level of cybersecurity in their organization. By doing so, they identify the weak points and fix them to avoid attacks from external sources. White hat hackers work as per the rules and regulations set by the government. White hat hackers are also known as ethical hackers. Motives & Aims: The goals of these types of hackers are helping businesses and an appetite for detecting gaps in networks’ security. They aim...

how many types of hackers in the world ?

Hackers can be classified into three different categories: Black Hat Hacker. White Hat Hacker. Grey Hat Hacker.!

how is hacking done ?

How is hacking done? Hackers can obtain your credentials through a number of means, but commonly they do so through a practice called keylogging. Through a social engineering attack, you could accidentally download software that records your keystrokes, saving your usernames and passwords as you enter them.

what is hacking ?

Image
What is hacking explain? Definition: Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose. Description: To better describe hacking, one needs to first understand hackers. シ