-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 8 years, 12 months ago
Reading Summary: Web Application Hacking
Web application hacking is very common through client-submission of unexpected inputs. Knowing how to leverage such vulnerabilities is very important and yet challenging […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading Summary: Malware
Malware infection is becoming very popular nowadays, ranging from Trojans, Backdoors, Zero-Days, Virus, Worms, and Polymorphic malware. Each organization has its way of handling such an […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading Summary: Social Engineering
Social Engineering has become a powerful hacker technique that most organizations still ignore, if not, underestimate its true impact. This technique takes into advantage the […]
-
Jeta Gjana's profile was updated 9 years ago
-
Jeta Gjana changed their profile picture 9 years ago
-
Jeta Gjana changed their profile picture 9 years ago
-
Jeta Gjana changed their profile picture 9 years ago
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading Summary: NetCat
NetCat is a tool built by Hobbit and made available in a Windows platform by Weld Pond. It is recommended to test the firewall and router configurations in a test environment and not […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading Summary:
Packet sniffing can exists in a switched or non-switched environment. Packet sniffing usually arises from an internal threat and it is shares the same concept as the man-in-the-middle attack […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Reading Summary: Enumeration and Footprinting
The Enumeration process identifies valid user accounts or any weak component/resource. Some of the key areas of information include user and groups, network […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Reading Summary:
The enterprise often contains firewalls and an intrusion detection system (IDS) to keep the organization secure. However, that is not enough to detect vulnerabilities or web attacks on an […]
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Week 3 Reading Summary Takeaways:
In the world of hacking, attackers start with reconnaissance process which has the objective to collect intelligence about the target. This is often accomplished through port […]
-
Jeta Gjana commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 9 years, 8 months ago
Good Afternoon Class,
I still do not have a team member; if you don’t either and would like to work together, please email me at jeta.gjana@temple.edu
Thank you.
-
Jeta Gjana commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 9 years, 8 months ago
Hello class,
Just wanted to share today’s highlight on international hackers stealing $1 billion from more than 100 banks in 30 countries, such as Russia, U.S. and China. 1 This goes along with the topic for this week and perhaps banks should adapt a secure n-tier architecture to secure their transactions and mitigate the risk of being hacked…[Read more]
-
Jeta Gjana changed their profile picture 9 years, 9 months ago
-
Jeta Gjana wrote a new post on the site Jeta Gjana 13 years, 8 months ago
One of the major ways to expand my horizon is through traveling. I love learning about new cultures; so far I have achieved my goal through traveling to various European countries. I have been back several times to my native country, Albania. During Fall 2010, I had the opportunity to study abroad in Rome and […]
-
Jeta Gjana and are now friends 14 years, 7 months ago
-
Jeta Gjana and are now friends 14 years, 7 months ago
-
Jeta Gjana commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 14 years, 7 months ago
Jeta Gjana commented on the blog post Extra Credit – Chapter 6 – The Traditional Approach to Requirements %s
The view of how the system responds to an event is modeled and implemented is different for the two approaches. The traditional approach views the system as a collection of processes. These processes interact with data entities and accept…