Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
My Hacking Report

My Hacking Report

Ratings: (0)|Views: 61 |Likes:
Published by abhishek_jha_46
MY HACKING REPORT IS THE OVERALL EXPLANATION ABOUT HACKING.
MY HACKING REPORT IS THE OVERALL EXPLANATION ABOUT HACKING.

More info:

Categories:Types, Research
Published by: abhishek_jha_46 on Feb 07, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/15/2012

pdf

text

original

 
 
ATRAINING REPORT
Submitted as a requirement for the partial fulfillment of DegreeBachelor of Technology in Information TechnologyFromRajasthan Technical University, Kota
Ethical Hacking
ATAPPIN KNOWLEDGE SOLUTIONS,DELHI
SUBMITTED TO: SUBMITTED BY:
Mr.Nitesh Chouhan Abhishek Jha(Project incharge) (Final Year IT)
M. L. V. Textile and Engineering College An Autonomous Engg. College of Rajasthan Govt.Bhilwara(Rajasthan)
1
 
 
 Acknowledgment
I would like to take this opportunity to express my heartfelt gratitude to anumber of people for their constant support.First and foremost, I would like to thank Asst. Professor 
Mr
.
MukeshVerma
(Head of Department - IT Dept.) all the encouragement andsupport he offered. I would also like to thank all the faculty members for their precious suggestions.I am deeply indebted to Asst. Professor 
Mr. Anurag Jagetiya
(TrainingPlacement Officer) for all the motivational and technical help that heselflessly offered to me.I humbly thank Asst. Professor 
Mr. Nitesh Chouhan
(Lect. IT Dept.).Last but not the least, I would like to thank my elders and friends whobelieved in me and always inspired me to be dedicated to my training.Thank youAbhishek Jha
2
 
 
PREFACE
The Internet has really changed our lives. However, with the useof the Internet in every single home and office, a lot of privacy concerns comeup. This seminar explores the numerous dangers of protecting information andinformation systems from unauthorized access, use, disclosure, modification, or destruction. Keywords that we will discuss include: Foot printing, Scanning,Trojans, Key loggers, Sniffers, Proxy Servers, and many more topics. With thecorrect mix of technical details and business insights, this talk also explores thevarious intellectual property protection issues that Outsourcing brings withitself. Plenty of real life case studies will be used to demonstrate the widespreadthreat of the Internet for both individuals and the corporate world.
 
Abhishek Jha
 
FINAL YEAR (IT)
3

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->