Saturday, November 28, 2009

ETHICAL HACKING INTRODUCTION


¤Reconnaissance
Active / passive
¤Scanning
¤Gaining access
Operating system level / application level
Network level
Denial of service
¤Maintaining access
Uploading / altering / downloading programs or data
Covering tracks

No comments:

Post a Comment

IF YOU LIKE THE MATTER DO LEAVE A VOTE OF THANKS. ALSO LEAVE YOUR VALUABLE SUGGESTIONS . INDIVIDUAL PROBLEMS WILL ALSO BE ADDRESSED.