An Overview of Hacking Techniques and Methods to Prevent IT

Provided by: International Research Association of Computer Science and Technology (IRACST)
Topic: Security
Format: PDF
"Security has become one of the most important goals in this era. Well there is no game in the rule of hacking. In this paper, the authors will describe the various methods used for bypassing authentication credentials. They will also provide list of some software's for windows environment (freeware which cannot be guaranteed) for educational purpose only to get authentication credentials. The paper mainly focus on the SQL injection attacks, use of key-loggers to bypass authentication credentials and hacking in windows environment by bypassing SAM databases and way to prevent these types of attack."

Find By Topic