What is Sniffing

What is Sniffing :- Sniffing is a data interception technology. Sniffing is generally referred to as a passive type of attack and difficult to detect.
What is Sniffing


What is CRYPTOGRAPHY :- Cryptography is the method of storing and transmitting data in a particular form. Meaning about cryptography Crypto - Hidden Graphy - Writing
1. What is CRYPTOGRAPHY prohathacker


What is STEGANOGRAPHY :- Setganography is the art and science of hiding messages and data files.The word Steganography is of Greek origin and means "covered writing". Setganography in this process we can attach the virus file or data file to the Text, Image, Audio, Video files. These files known as cover file
1. What is STEGANOGRAPHY prohathacker

What is KeyLogger

What is KeyLogger :- A Keylogger is a type of spyware software that capability to record every keystroke you make to a log file, take a screen snapshot, record instant message, email etc.
1. What is KeyLogger prohathacker

What is Password Hacking

What is Password Hacking :- A password is a unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.
What is Password Hacking

What is Windows Hacking

What is Windows Hacking
# Registry :- the registry is a repository of data about data.
# GPEdit :- the local group policy editor is a Microsoft management console that provides a single user interface through which all the settings of local group policy objects can be managed.
1. What is Windows Hacking prohathacker

What is Enumeration

What is Enumeration :- Obtain information about accounts, network resources and share or other hand Enumeration is process to find out User Name, Group, Using OS in network, open ports, network resources etc. But westart Enumeration in target system here Hacker can make a fixed active connection to the target system. So Hacker can hack the target then start Enumeration process.

What is Scanning

What is Scanning :- What is running on the target system called Scanning. For Example Running OS Operating System, IP Address, Which Services are Run on Target System and Open Ports in Network etc.
1. What is Scanning prohathacker

What is Proxy Server

What is Proxy Server :- A Proxy Server is acts as a mediator for request from clients to Server. A client connects to the Proxy Server, requesting some services such as a file, connection, web page or other resource available from a Server.
What is Proxy Server

What is Footprinting

What is Footprinting :- Footprinting is a process to find out and gathering target all valuable information. Footprinting is the first step taken by hackers to hack a computer system or network. We are Gathering information using Footprinting.
What is Footprinting

What is Ethical Hacking

What is Hacking :- Hacking is a process to find out or identifying weakness in our Computer and Networks System.
What is Ethical Hacking

What is Network Devices

What is Network Devices :- Computer Networking devices can communicate two or more different network without these Devices network communication can’t be possible.

Type of Network Devices :-
# Repeater
# Hub
# Bridge
# Switch
# Router
# Proxy
# Firewall

Linux Basic Commands

Linux Basic Commands :- Rules For Commands In LINUX
Linux Basic Commands
# Case Sensitive (Lower Case by default).
# Always use single space between objects (Commands, Options, Arguments).
# Always use - or - - before any option.

What is Transmission Media

Transmission Media :- When we create a computer network then we need to communication medium this medium can be wired or wireless.

There are two type of transmission media:-
Wired medium or Guided medium.
# Wireless medium or unguided medium.