Startertutorials Blog
Tutorials and articles related to programming, computer science, technology and others.
Subscribe to Startertutorials.com's YouTube channel for different tutorial and lecture videos.
Home » Security and Hacking » Page 2

The Need for Computer Forensics

Suryateja Pericherla Categories: Security and Hacking. No Comments on The Need for Computer Forensics

In this article we will look at what is the need for computer forensics and what are the challenges faced by forensics investigators while dealing with storage devices.   The advances in ICT and computers provides avenues for misuse as well as opportunities for committing crime. The widespread use of computer forensics is the result […]

Read the rest of this entry »

Introduction to Digital Forensics

Suryateja Pericherla Categories: Security and Hacking. No Comments on Introduction to Digital Forensics

In this article we will look at introduction to digital forensics which covers computer forensics, cyber forensics and some introduction to digital forensics science.   Introduction Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer […]

Read the rest of this entry »

Identity Theft

Suryateja Pericherla Categories: Security and Hacking. No Comments on Identity Theft

In this article we will look at what is identity theft, what is personally identifiable information and different types of identity theft.   What is Identity Theft? Identity theft refers to the fraud committed by pretending as a legitimate official or some other person and stealing the sensitive information of victims. The person (victim) whose […]

Read the rest of this entry »

Attacks on Wireless Networks

Suryateja Pericherla Categories: Security and Hacking. No Comments on Attacks on Wireless Networks

In this article we will look at different attacks on wireless networks that can be performed and general guidelines for protection against those attacks.   Watch this video to learn about attacks on wireless networks:   Penetration of a wireless network through unauthorized access is termed as wireless cracking. Availability of various tools made it […]

Read the rest of this entry »

SQL Injection Attack

Suryateja Pericherla Categories: Security and Hacking. No Comments on SQL Injection Attack

In this article we will look at what is SQL injection, how to perform SQL attack and how to protect against SQL injection attacks.   What is SQL Injection Attack SQL injection is a code injection technique that exploits a security vulnerability present at the database layer of an application. The vulnerability is present due […]

Read the rest of this entry »

Steganography

Suryateja Pericherla Categories: Security and Hacking. No Comments on Steganography

In this article we will look at what is steganography and the process of encoding and decoding an object using steganography.   Steganography means concealed writing. It is a way of data hiding. Steganography can also be referred using different names like data hiding, information hiding, and digital watermarking. Digital watermarking can be used to […]

Read the rest of this entry »
Facebook
Twitter
Pinterest
Youtube
Instagram
Blogarama - Blog Directory