chatting softwares always use the application layer to send and recieve messages that include using tcp or udp protocols for deleviery , today we will explain how to send messages using Ping ( ICMP protocol ) which is layer 3 protocol using Scapy .
we have to know that there's a different types/categories of security assessments to assess the level of the security on any network resources in the organization, security assessment divided into three categories:
Today I will show you how to install conky on your linux desktop enviroment.
So what is conky ?is a free software system monitor for the X Window System. It is available for Linux, FreeBSD, and OpenBSD. Conky is highly configurable and is able to monitor many system variables including the status of the CPU, memory, swap space, disk storage, temperatures, , network interfaces, battery power, system messages, e-mail inboxes, Arch Linux updates, many popular music players (MPD, XMMS2, BMPx, Audacious, etc.), weather updates, breaking news, and much more. Unlike system monitors that use high-level widget toolkits to render their information, Conky is drawn directly in an X window. This allows it to consume relatively fewer system resources when configured similarly.
Today I will show you how to create a phishing page for facebook
What is a Phishing ?
Is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a
As a Security Professional you need the power to penetrate into any machine but antivirus softwares always get in your way , in this article we will explain in detail how to obfuscate and embed your malware into a antivirus Software to hide it from antivirus softwares.
Even if you are not a Linux fan or you have never heared about it, lets imagine how the world might be without Linux ..
Here is some of it's great applications that we will never met them if there is no Linux
Android is now the most used operating system around the world , as you read this article more than million users just downloaded an android app , majority of app downloads come from google play store ( official store for android apps ) but users may go for external sources to get the paid apps free , which create a great dangerous cause these apps usually modified with embedded malware or adware scripts .
how hackers can get the source of an app ? how they can modified it and sign it ? in this article we will give all information you need to know about this subject .
Why should I be a Certified Ethical Hacker ?
Here you succes begins , its the first step to start your career in cyber security.
The Certified Ethical Hacker (CEH) is an intermediate-level credential offered by the International Council of Electronic Commerce Consultants (EC-Council). Also registerd to be one of the top 15 paying certfication on the world for many years .
In CEH you will learn possess skills and knowledge on hacking practices in areas such as footprinting and reconnaissance, scanning networks, enumeration, system hacking, Trojans, worms and viruses, sniffers, denial of service attacks, social engineering, session hijacking, hacking web servers, wireless networks and web applications, SQL injection, cryptography, penetration testing, evading IDS, firewalls and honeypots and more.
Where to be certified ?
SMT-center an Authorized Training Center , the award of best instrutor for 2015 -2012 was given fo Sami AbuTahoun the CEO of SMT-Center .
And you can attend the exam on SMT also.
it's start with a vision, take all the valuable machine data generated by technology and put it in a hands of everyone! so they can run, secure and audit IT better, so they can understand and responed to the behavior of customers, devices, services and users in real time, but this is a way too complicated, so here's the good news..
If you are an IT Manager then you know how much it's struggling to take responsibility for the entire IT infrastructure including: 1- flawless IT Operations 2- Network Security 3- prove IT Compliance, So what you need here is a visibility into what is going on in your environment, audit data about critical changes, access Management and privileged user activity. So how to make sure that you have all the data you need. A Lot of Administrators is the classic solution but they just can't provide you the right data at the right time, What you need at this point is an auditing tool.