Pay per Click (PPC) fraud

Any advertising transaction has three primary parties: the advertiser, the publisher, and the viewer. The advertiser is a company that produces content it would like to display to potential customers. This content is an advertisement for a specific product or service that is likely to generate revenue for the advertiser. The publisher is a creative […]

Mobile Malicious code – How to Hack your Device??

Although rare and only a more recent occurrence, SMS messages sent to mobile devices may also attempt to convince users to install a mobile malicious code. On or before February 4, 2009, Chinese mobile phone users began reporting a new virus that affects Symbian S60.25 A signature is required on all code that runs on […]

HTTP Protocol– full information

HTTP has become the de facto high level protocol on the Internet. As the protocol used for accessing content on the World Wide Web, developers adapted it to carry much more thanjust the static text and images of Web pages. It now carries audio andvideo streams, can transfer large files, and can even carry application-to-application […]

Tunneling Techniques

Most enterprise security controls include strong firewalls, intrusiondetection systems (IDSs), and user policies, such as proxies and time-of-day rules that limit the amount and type of traffic generated onuser networks. Tunneling data through other protocols often by passes these controls and may allow sensitive data to exit the network andunwanted data to enter. It is […]

Proxies Use-How to use proxies??

📣Detecting proxies is difficult andnot always reliable. Since many malicious code authors install customproxies and use encrypted or custom protocols, it is very difficult to detect all proxies. There are techniques to detect common proxies, but such techniques are unlikely to be effective against attackers who use proxies aggressively. Port scanning on corporate networks can […]

Proxies Types:

Proxies are so common that many attackers scan the Internet for common listening proxy ports. The most common proxies listen on TCP port 80 (HTTP proxies), 8000, 8081,443, 1080 (SOCKS Proxy), and 3128 (Squid Proxy), and some also handle User Datagram Protocol (UDP). Attackers who install custom proxies often do not use standard ports but […]

What is proxy? Why hackers use proxies?? A to Z information

How nd Why Attackers Use Proxies Masking one’s IP address is a standard practice when conducting illicit activities. A well-configured proxy provides robust anonymity and does not log activity, thereby frustrating law enforcement effort to identify the original location of the  person involved. A proxy allows actors to send network  traffic through another computer, which  satisfies request and returns the result,  Students or […]

Firewalls–Types and How to work??

Type of Firewalls Packet-Filtering Firewalls:- The most rudimentary of firewalls is the packet filtering firewall. Packet filtering firewalls work at the IP level of the network. Most routers  integrate this type of firewall to perform  basic filtering of packet based on an IP address. The principal behind packet filtering firewalls is that the firewall bases the decision to allow a […]

What is Firewall?? A to Z information.

The Internet of today is in stark contrast to the close-knit group of research network the made up the Internet forty year ago.As the internet has grown, the need to protect networks and even individual com-puters has become a major concern. To this.end, devices and software that fall under the banner of firewall have become a […]