Wednesday, 2 November 2016

Ethical Hacking

Hi All,

Ethical Hacking is really linked with client server computing, since hacking mostly affect servers.

Ethical hackers are doing the same for a good purpose, help protect vulnerable servers.

How they are doing so. For this purpose we should follow the same path of hackers

1. Footprinting - With commands such as 'who is', ping, traceroot, nslookup , this is carried out.

2. Scanning - nmap, nessus etc are used for this purpose

3. Enumeration - netcat, tcpdump, telnet, firewalk etc used for this purpose

We will see more on this soon.

Bye

Monday, 30 November 2015

Introduction


Preface - In recent years there have been significant advances in the development of high performance personal computers and networks. There is now an identifiable trend in industry toward downsizing that is replacing expensive mainframe computers with more cost-effective networks of personal computer that achieve the same or even better
Term used in1980
Definition : Client/Server Computing: An Introduction, features objectives, evaluations and details of Client/Server development tools, used operating system, database management system and its mechanism in respect of Client/Server computing and network components used in order to build effective Client/Server applications.