by hljw1 | Jan 8, 2016 | Hacking
Hacking WEP protected WI-FI What is WEP protected WI-FI? Short for Wired Equivalent Privacy, WEP is a security algorithm for IEEE 802.11 (type of connection) wireless networks.Its intention was to provide data confidentiality comparable to that of a traditional...
by hljw1 | Jan 8, 2016 | Fraud/Scam
What is an IRS Scam Call? An IRS Scam Call is when scammers make unsolicited calls. These scammers call taxpayers claiming to be IRS (Internal Revenue Service, the revenue service of USA) officials . They demand that the victim pay a fake tax bill and they con...
by hljw1 | Jan 8, 2016 | Hacking
DDoS Attack What is a DDoS Attack? Short for distributed denial of service, a DDoS Attack is an attack in which a collection of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. How do you launch...
by hljw1 | Jan 7, 2016 | Uncategorized
Fork Bomb What is a Fork Bomb? A fork bomb is the equivalent of a DOS attack on your own system. DOS is short for Denial of Service and this type of attack is an attempt to make a machine or network resource unavailable. How do you create a Fork Bomb? Start off by...
by hljw1 | Jan 7, 2016 | Hacking
USB Stealer What is a USB Stealer? A USB stealer is a custom or normal USB that contains certain software dedicated to locating passwords that has been saved on your computer. How is a USB Stealer Created? Before the USB can do anything you’ll need to install...
Recent Comments