Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Introduction
Chapter 1: Bluetooth Hacking
Introduction To Bluetooth
Advantages/disadvantages
What are the disadvantages/why should we avoid it happening
Diagram representation
Bluetooth hacking software’s
Conclusion
Chapter 2: methods of hacking a website
Cross-site request forgery
Frame injection
Javascript injection
Sql injection
Chapter 3: spam
Different types of spam
Email spam
Email spamming techniques
Costs involved in spamming
Anti spamming techniques
Chapter 4: security breach awareness
Introduction
Types of security breach
Conclusion
Chapter 5: a case study of hacking
OS identification
How to identify a remote computer ip
Pre request for hacking
Protecting yourself before hacking
Cookies
Chapter 6: use of CAPTCHA to avoid hacking
Why implement CAPTCHA in ASP?
How to implement CAPTCHA in ASP?
Display image & get input from user
Chapter 7: internet security
What’s a threat?
Virus vs spyware
Symptoms that you are a victim of cybercrime
How to protect from internet threats?
Encryption
Decryption
Cryptography
What are viruses, worms and trojan horses and what are the differences between them?
Conclusion
← Prev
Back
Next →
← Prev
Back
Next →