Thursday, 29 August 2019

SOFTWARE PIRACY AND ETHICAL HACKING

The act of copying software without being authorized for its uses its termed as software piracy if some needs to use particular software He need to buy it's uses authentication one must kept in mind That Laing before using permit it's uses how ever it does not make the owner of the particular software Ethical is conducted In an organizational manner the system and application that needs to be tested are determined by analysing requirement of client Ethical hacker must follow the activity to ensure that ethical and moral rule are met 1. Take authorization permission and get a singed contract from the client that given Permission to the tester to perform the test Sign is non-disclosure agreement with the client .in case of any confidential information need to be disclose during testing

Tuesday, 6 August 2019

HACKER BLACK HAT

A black hat hacker (or black-hat hacker) is a hacker who violates computer security for personal gain or maliciousness. The term's origin is often attributed to hacker culture theorist Aniket (though he denies coining it) to contrast the exploitative hacker with the white hat hacker who hacks protectively by drawing attention to vulnerabilities in computer systems that require repair.[2] The black hat/white hat terminology originates in the Western genre of popular American culture, in which black and white hats denote villainous and heroic cowboys respectively Black hat hackers are the stereotypical illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal" Black hat hackers break into secure networks to destroy, modify, or steal data, or to make the networks unusable for authorized network users

Neural network

One of the most powerful things about our brains is the way neurons allow us to learn. Computer scientists have been inspired by the way th...