messages

Bluetooth hacking

Which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?

Which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth? Option 1 : Bluejacking Option 2 : Bluebugging Option 3 : Bluesnarfing Option 4 : Bluesmacking 1. Bluejacking Bluejacking is maybe the foremost common sort of Bluetooth hacking. This happens once a hacker searches for discoverable devices within the space and so sends spam within the sort of text messages to the devices. this manner of …

Which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth? Read More »

Analyzing-Router-Logs-in-Network-Forensic-Investigation

Analyzing Router Logs in Network Forensic Investigation

Analyzing Router Logs in Network Forensic Investigation, in this the investigator collects the logs of a router to examine and determine the details such as IP addresses and the protocols. Redirection of the logs to syslog server is done in the following mariner: #config terminal Logging 192.168.1.1 During any network hacking, or unauthorized access scenarios, all the logs pertaining to the attack will be stored in the compromised device, which may be the router/switch, database, IDS, …

Analyzing Router Logs in Network Forensic Investigation Read More »

Anti-Forensics-Techniques-Steganography

Anti-Forensics Techniques: Steganography

Anti-Forensics Techniques: Steganography, the art of hidden writing, has been in use for centuries. It involves embedding a hidden message in some transport or carrier medium and mathematicians, military personnel, and scientists have been using it. They all engage in changing the common language and transferring it through secret and hidden communication. The history of steganography dates back to the Egyptian civilization. Today, with the emergence of the Internet and multimedia, the use of steganography …

Anti-Forensics Techniques: Steganography Read More »

ISO-27001-Annex-A.13.2.3-Electronic-Messaging-&-A.13.2.4-Confidentiality-or Non-Disclosure-Agreements

ISO 27001 Annex : A.13.2.3 Electronic Messaging & A.13.2.4 Confidentiality or Non-Disclosure Agreements

In this article explain ISO 27001 Annex : A.13.2.3 Electronic Messaging & A.13.2.4 Confidentiality or Non-Disclosure Agreements . A.13.2.3  Electronic Messaging Control- Electronic messaging information should be adequately protected. Implementation Guidance – The following should include information security aspects for electronic messages: Protecting messages against unauthorized access, change or denial of services in line with the organization’s classification scheme; ensure that the message is correctly addressed and transported; Service reliability and availability; Legal considerations, such …

ISO 27001 Annex : A.13.2.3 Electronic Messaging & A.13.2.4 Confidentiality or Non-Disclosure Agreements Read More »

Introduction-to-the-Command-Line-Interface-(CLI)-with-the-help-of-Features

Introduction to the Command Line Interface (CLI) with the help of Features

Introduction to the Command Line Interface (CLI) with the help of Features In this article is explaining CLI Features , how to use CLI & how to debug CLI. If you printed the Cisco IOS Command Reference documents, you’d end up with a stack of paper several feet tall. nobody should expect to memorize all the commands—and nobody does. you’ll use several very easy, convenient tools to assist remember commands and save time typing. As …

Introduction to the Command Line Interface (CLI) with the help of Features Read More »

dhcp-request-reply-messages

DHCP Request/Reply Messages

DHCP DHCP Request/Reply Messages a device that already has an IP address can use the simple request/reply exchange Message to get other configuration parameters from a DHCP server. When the DHCP client receives a DHCP offer, the client immediately responds by sending back a DHCP request packet. Devices that aren’t using DHCP to accumulate IP addresses can still utilize DHCP’s other configuration capabilities. A client can broadcast a DHCP INFORM message to request that any …

DHCP Request/Reply Messages Read More »

Introduction-of-USB-Spyware-and-It's-types

Introduction of USB Spyware and It’s types

Introduction of USB Spyware and It’s types in this Spyware artical you will learn about USB, Spyware Engendering, Types of USB,Types of Spyware like Desktop, Email,Child-Observing, Internet etc. What is USB Spyware ? USB spyware screens and breaks down information moved between any USB gadget associated with a PC and its applications. It helps in application improvement, USB gadget driver or equipment advancement and offers an incredible stage for successful coding, testing, and streamlining. Coming …

Introduction of USB Spyware and It’s types Read More »