IT Security

  • What is Hacking ?

    During the 1990s, the term “hacker” originally denoted a skilled programmer proficient in machine code and computer operating systems. In particular, these individuals could always hack on an unsatisfactory system to solve problems and engage in a little software company espionage by interpreting a competitor’s code. Unfortunately, some of these hackers also became experts at […]

  • What is port scan?

    Facts About Port Scanning Each individual computer runs on multiple ports. For instance, when a person opens his or her email, the computer’s server will open a port through which new mail will be downloaded through a connection to the email server. Certain ports on an individual’s personal computer are open continually, making them a […]

  • What is phishing?

    When used in the realm of computer security, “phishing” refers to electronic communications, such as emails, that are sent with the purpose of fraudulently gaining access to user information. Email is the most common form of phishing attack, but instant messages (IM), social networking postings, telephone calls, or text messaging might also be used. The […]