Categories
Hacking TECH & CYBERSECURITY

The 5 Phases of Hacking

In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Most Common Hacking Techniques

What Are Top 10 Common Hacking Techniques? Phishing Denial of Service [ DoS/DDoS ] Waterhole attacks Fake WAP Eavesdropping Keylogging Virus, Trojan Click Jacking Cookie theft Bait & switch Phishing When a hacker uses phishing, he usually replicates a very popular site with the idea of making the user sign in and use his credentials in […]

Categories
Software TECH & CYBERSECURITY

Top 5 Free Windows Antivirus

To begin, i need to mention that Windows Defender is doing a pretty good job at protecting your Windows 10 computer. So all you need is a second option malware scanner. One that doesn’t take the role of your main antivirus but comes with all/some of the features to become one. One of such is […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Detect Rootkits In Kali Linux

What is a Rootkit? A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. Rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes. You can see in this scene […]