Posts

Showing posts from August, 2020

CEH 20- Cryptography

Image
↑ Previous Page Next Page What is Cryptography? Cryptography is a process of converting plain text data (readable) into ciphertext (unreadable) data to protect confidentiality, so that unauthorized users cannot understand what is transmitted.  Encryption algorithms are used to perform mathematical computation on data using the key and convert data to ciphertext.  The algorithm that is chosen to perform encryption with some key can also be used for decryption.  Decryption is the process of converting ciphertext to plaintext.  Cryptography is used to protect the confidentiality of information shared on the internet such as email messages, chat sessions, web transactions, personal data, corporate data, e-commerce applications, etc. Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn

CEH 19- Cloud Computing

Image
↑ Previous Page Next Page What is Cloud? The Cloud refers to Servers that are accessed over the Internet. The software and databases runs on those servers.  Cloud servers are located in data centers all over the world.  By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines. Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime the word "Hacking" that is used on this site shall be regarded as Ethical Hacking.   What is Cloud Computing? Cloud Computing is the practice of using a network of remote servers hosted on the internet to store, manage, and process data

CEH 18- IoT Hacking

Image
↑ Previous Page Next Page In this article, we will learn about the basics of IoT Hacking.  Hacking IoT means compromising electronic/embedded devices that are connected to the internet. To know about IoT Hacking, first we need to know about the "IoT, IoT devices and its working". So, let's get started. Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime the word "Hacking" that is used on this site shall be regarded as Ethical Hacking.   What is IoT? IoT Stands for IoT "Internet of Things". Internet of Things is the concept of connecting any device to the Internet and to other connected devices, which collect and share data.  The

CEH 17- Hacking Mobile Platforms

Image
↑ Previous Page Next Page Everyone interested in hacking mobile.  But it is illegal to hack a mobile without the permission of the owner.  Here hacking mobiles, just to bring awareness on mobile hacking and protect yourself. Before hacking mobiles, first we need to know some basics of mobiles and its working. So let's get started. Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime the word "Hacking" that is used on this site shall be regarded as Ethical Hacking. What is Mobile Phone? A mobile phone, cellular phone, cell phone, cellphone or hand phone, sometimes shortened to simply mobile, cell or just phone. It is a portable telephone that can

CEH 16- WiFi Hacking

Image
↑ Previous Page Next Page WiFi Hacking is most important aspect in hacking devices. If we compromise WiFi, we can do a lot in that network. We can gain access to devices in that network. We can also sniff the data, redirect the data of devices in the network. Before we are going to hack WiFi, first we need to know about, what is WiFi? and how it works? Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime the word "Hacking" that is used on this site shall be regarded as Ethical Hacking. What is WiFi? Wi