-
Ruslan Yakush wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading
Proxy servers are used to intercept data between private and public networks for increased response time when querying domain names by caching data, masking origin’s Public IP Address to fake point of […]
-
Ruslan Yakush wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
MALWARE
Malware, or malicious software, is a collection of malicious codes that have unique effect if executed on targeted system. Worms, spyware, rootkits, viruses, etc. are some of the examples of those […]
-
Ruslan Yakush wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Social Engineering, Encoding, and Encryption
Social Engineering can be described as human psychological or behavioral technique that allows to gain trust of a targeted victim. For example, pretending to be an […]
-
Ruslan Yakush wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Reading Summary: NETCAT
Netcat is very powerful tool that is similar to Nmap, but has ability to not only read, but also write data across network connections. The process involved using command lines with […]
-
Ruslan Yakush wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Reading Summary: SNIFFERS
Sniffing techniques allows to eavesdrop on switched networks, meaning when appropriate tools are used it is possible to collect network traffic data frames and packets in order […]
-
Ruslan Yakush wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Foot Printing and Enumeration
As the first steps in hacking process, Foot Printing/Reconnaissance is intended for information gathering of the target organization using publicly accessible information without […]
-
Ruslan Yakush wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Reading Summary:
Many business in nowadays forget about critical asset of their business; that is, Protecting Business Data. Unfortunately, most owners and management take care only about customers and business […]
-
Ruslan Yakush wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Google Hacking
It is really interesting post related to background information processing or in other words, behind the scene actions that allow to tweak search field and get various results. It is done using […]
-
Ruslan Yakush posted a new activity comment 9 years, 2 months ago
In The News
As per recent hacking attack conducted against Ashley Madison’s adultery-promoting web site as reported by Philadelphia Action News and online resources, it has been a big deal since a lot of military and government related officials’ personal information have been compromised. Now, people cannot even remove their profiles unless paid…[Read more] -
Ruslan Yakush changed their profile picture 9 years, 2 months ago
-
Ruslan Yakush's profile was updated 9 years, 2 months ago