Posts

Showing posts from June, 2019

Mobile Phone Hacking Applications & Techniques

What is Phone hacking It is the practice or action of getting unauthorized access to information and data stored in another individual’s phone. The level of access you can get depends on your abilities. Why should someone hack into a cell phone? 1.  How to hack a cell phone to protect your kid · The latest statistics have shown that a huge number of kids, especially teenagers own a cell phone. · Parents want their kids to have a cell phone so they can call them whenever they want to hear their voice and determine their location. ·           However, owning a cell phone as a kid brings some risks too. · First of all, kids can be tricked by people with bad intentions when they use text messages or when they use the Internet. · Additionally, kids can decide to skip school and not answer their phones when their parents are calling. ·           These are some of the situations when you definitely want to know ...

SYSTEM HACKING

System Access —   System access is the ability for an unauthorized intruder to gain access to a system or device for which the intruder does not have an account or a password. —   Entering or accessing systems to which one does not have access usually involves running a hack, script, or tool that exploits a known vulnerability of the system or application being attacked. System Access Techniques —   System Access (also known as System Hacking ) follows: foot printing / Reconnaissance phase. —   System-hacking phase in a single pass - It involves using a methodical approach that includes: ◦       cracking passwords, ◦       escalating privileges, ◦       executing applications, ◦       covering tracks - concealing evidence, and then ◦       Pushing into a more involved attack.  By Eve, The University of Nairo...

BUSINESS PROCESS RE-ENGINEERING

Business Process Re-engineering also commonly known as BPR involves the radical redesign of core business processes to achieve dramatic improvements in productivity, cycle times and quality. In BPR, companies start with a blank sheet of paper and rethink existing processes to deliver more value to the customer. They typically adopt a new value system that places increased emphasis on customer needs. Companies reduce organizational layers and eliminate unproductive activities in two key areas. -First, they redesign functional organizations into cross-functional teams. -Second, they use technology to improve data dissemination and decision making. How Business Process Re-engineering works: Business Process Re-engineering is a dramatic change initiative that contains five major steps that managers should take: ·          Refocus company values on customer needs ·          Redesign core process...

ETHICAL HACKING

    Most people think hackers have extraordinary skill and knowledge that allow them to hack into computer systems and find valuable information. The term hacker conjures up images of a young computer whiz who types a few commands at a computer screen and poof! the computer spits out passwords, account numbers and other confidential data.     In reality, a good hacker, or security professional acting as an Ethical Hacker , just has to understand how a computer system works and know what tools to employ in order to find a security weakness. Most ethical hackers are in the business for hacking for profit, an activity known as Penetration Testing or Pen Testing . Pen testing is usually conducted by a security professional to identify security risks and vulnerabilities in systems and networks.     The purpose of identifying risks and vulnerabilities is so that a counter measure can be put in and the risk mitigated to some degree. Ethical ...