Skip to main content

About Us

Hi Viewers/Readers.

My name is “Prateek Nagpal” having 5 years of experience in I.T domain working as “Security Analyst”, done certification related to information security like - CEH, Certified Information Security Expert (CISE) as well as did “Diploma in cyber Law” from Government Law College (Mumbai), currently pursuing CCNA and have a dream to go further with information security top most certifications like: CISSP (Certified Information Systems Security Professional), CISM(Certified Information Security Manager), CCNP Security in next up coming years.

As the digital technology is increasing at the alarming rate day by day, year by year, so the crime is also increasing. Looking all this and keeping in mind I started writing the blogs to bring in front of you what is information security , need and why it is so important and why it is today’s hot domain.

Information Security is a big domain itself like an ocean. Nowadays all the things are getting online like - shopping, bills payment, fund transfer, net banking. If we want the information related to individuals or an organization we get it easily by making a Google search or by searching for a social media websites like- facebook, LinkedIn or by making a search on the job sites. So the cybercrime has also evolved and is increasing at an alarming rate. I am here to let you know who are behind the cybercrime. The individuals or the groups who uses the electronic assets (Laptop, Smartphone’s, and PC)   and internet to breaks the individuals or the organizations private network security in order to steal their private, confidential, important information, documents which can harm the other life or can affect the reputation are called as “Hackers”.

I am trying my level best to let you make understand the pros/cons of hacking and what the hacker can do...We’ve all heard of hackers. Many of us have even suffered the consequences of hacker actions. So who are these hackers? Why is it important to know about them? What they can do? You will get answered to all this in my website. This web site is only for Educational purpose.

We must have to be very careful while we are over The Internet. I am writing this blog in order to make you aware about hacker’s and their activity.

In this blog I will let you about the types of hackers, the information flow over the networks, the phases of hacking , some basic tools used in hacking with the demo how it works , virus and how to make your own virus, Window hacking , command prompt (CMD) ticks, about the cyber law.  

Hacking is illegal it’s a request please what so every knowledge you will gain from this book don’t use it against any live network , for practice do it in your systems or making your own small virtual network

What so ever the knowledge I have gained till date I am going to share with you and further what so ever knowledge I will gain will keep adding to this blog. I hope will enjoy lots.


Hackers4cracks.blogspot.in” is a place to learn, understand and explore the facts of the computer, network, and Security technology.

If you further have any quarries you can mail me to:

nagpalprateek8@gmail.com


Comments

Popular posts from this blog

DoS Attack: - Don’t let your network to be a next victim

Understand the Dos Attack, how it can cause damage to the network.  Internet the network of a network was the wonderful result of many geniuses and intelligent guys who has changed the world totally. Now a day everyone is free to access the internet from any corner of the world and with any devices. It is not secure to surf on internet as the internet is now is the hub of infections like: - viruses, worms, attacks, malwares and most important the hackers. No one is secure if you are surfing on internet you must have to keep in mind what to do and what not to do then only you are secure otherwise not. Everything is now digitalized, no need to go anywhere sit at home and do what you want to do, if you want to pay the bills (electricity, telephone, mobile) pay it online, you want to do shopping go to online shopping site do it and get your product delivered at your footstep, you need to buy a electronics purchase online, why to go to bank to transfer money do it through intern...

Take Email Security seriously

Now a days Email or Electronic Mail has become the important part of entire organizations as well as per personal life, now a days 5-10 % are dependent or relays on postal mail. Approximate 1000’s of the mails are send & received by each of the organizations related to work as email has made our life easy, fast and convenient, we are  now able to get response of our mail within a second. Now a day’s as a technology is changing we have to take the security of our IT assets or resources seriously most important is of Email security. Now a days hackers are creative and they can create mail which look life professional mail (either from bank, form other organizations) asking for your personal details. Some hackers make a fraud mail which looks like professionals’ mail having the attachments photos or something else at the backend bind with virus so as soon you open the mail system got infected with virus and can be a risk to entire network. Organizations have to provide the aware...

Best Practice for securing the organization network.

The best and most important practice is the creation and enforcement of I.T security policies, there must also have the system specific rules to address the policies for the individual systems & data. The policies can address or point to any security controls from password to backup, applications to servers. The most important of all is the proper use of the I.T resources. Each and everyone in the organization must have to understand his responsibility, must use the I.T resources in a limit. All the I.T security policies or other policies have to be available in the organizations intranet. The best of all practice is to have DMZ (Demilitarized) zone . DMZ is logical network separating LAN ( Local Area Network ) from the Internet ( Untrusted Network. ). DMZ provides the extra layer of security as it restricts the attackers or someone else to access the internal servers and data via internet. Any service that is being provided to users on the Internet should be placed in the DMZ. T...