I don't think you need to tell you about hacking. Hacking in this age of the Internet does not make any sense. Hacking has become a commonplace nowadays. Hackers nowadays adopt various methods for hacking. In this article, I will briefly discuss some of the methods. So for those who are curious about these things, keep on wearing them.


1. Keylogger / Keyboard Capturing:
Kilgar is a method where some software runs on the system, which saves all your typing. If you input your email password etc. on the device on which this software is run, then this software will save all your input data and provide it to the hacker. So be careful when inputting personal emails and passwords on your friend or someone else's computer or smartphone.


2. Denial of Service / Distributed Denial of Service:
Daniel of Service Attack is also one of the easiest ways to downsize a website. This method brings a lot of heavy traffic to a site at the same time. The server is brought in so much trafficCannot process so much data at the same time that the server of the final site crashes. What is interesting, though, is that hackers use computers to drive traffic to the site The owner of those computers does not even know that his computer is being used in a site server crash. That means those hackers also illegally access the hacker.


3. Fake WAP:
If you do not want to use the free internet! Hackers using free internet sources steal personal data of those who use the internet in those sources. In this way, the hacker creates a fake wireless access point and connects it to an official public network. Best source for any public WiFi. So if you want to avoid hack, it is wise to not use it. If you are using a VPN server then you must use it.


4. Phishing:

Phishing is a popular method to hack online accounts. In this way, the hacker creates a login page similar to the login page of the site that your account targets. Hackers bring this login page to you in some way. This login page is similar to the original login page so you fill in this form with your login information without having to worry about anything. And this form runs some programs that provide all your hacked information hackers. So before logging into a site, you must check the site link.



5. Brute Force Attack:
Brute Force Attack is a popular method in the world of hacking. This is basically a computer program. Run this program and run auto attack with password dictionary. Somehow the username and password were mixed up just got the job done! The most important thing you can do to protect your account from brute force attacks is to use a strong password.

6. Virus, Trojan, etc.:

Virus Attack is currently a common hacking method. Even when we are unknowingly infected with this attack. In this way, the hacker inserts the virus into the device of Victim which steals the Victim's data When we get the premium version of a software free, we start using it in a loaf. We don't think a hacker can infect viruses into your computer or smartphone through this. If you want to avoid a virus attack, then you should skip the use of premium software free as well as be careful when clicking on an external link and add.



7. Cookie theft:

Browser cookies store your confidential information such as usernames, emails, passwords, etc. Now if a hacker steals your browser cookies! So something very big can happen? However modern cookies are stolen from modern browsers Most of the hard work, as well as the browser does not keep cookies at all simple. The browser uses a special encryption method to store cookies, which is not an easy task to decrypt. Hackers can't steal cookies That doesn't mean you can't decrypt.

1 Comments

Post a Comment

Previous Post Next Post