SHAREPOINT

SHAREPOINT
Spotlight on share server 2010

Saturday, December 18, 2010

IT WILL NOT, THAT EASY FOR A NOVICE TO HACK A SECURED SERVER

Dear Sir/Mam



Pls do not publish such critical security related articles .However , Sonal & Neha sharma are sucesseded , to provide information on Survilence/Detectives/Devices & technology Used by experts for Detecting and Preventing hacker's /Intruders from ill-legal access to Information Servers(Confidential). No one is born till now , who claims that he hack a computer on his ownself ( Enterprise & Govt. PC's) , somebody from the department (any) provide them MAC address of the

Server , or a Fool , who unintentionaly allowed intruders , to take the control remotely.Otherwise its Impossible to intrude into secured server's.

If you are receiving bounce back messages from emails that you HAVEN'T sent you have probably been 'spoofed' .

Email spoofing: is when the sender changes the name in an outgoing email so that it looks like the email came from somewhere or someone else. This practice is often used by spammers to stop people finding out who they are. It also means that when the spam mail is rejected by the addressee's mail server, the bounce back message goes to whoever was specified in the outgoing mail rather than to the spammer themselves.

Important Note:At present there is nothing we can do to avoid this nuisance. If you have been spoofed, please simply delete the bounce back messages. It doesn't mean that anyone has accessed your email account. You will probably find you receive a few for a short while and then they will stop. However we are trying very hard to devolp a Platform Common for all the server's in use at present. So , pls Ask people to , will not click on any mail msg they dont know , who is the sender & never provide information , asked Necssary for claim their winning lotto/Beneficery/Coca-Cola / Live etc.

Snooping, in a security context, is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual observance of an e-mail that appears on another's computer screen or watching what someone else is typing. More sophisticated snooping uses software programs to remotely monitor activity on a computer or network .

Device's.

Malicious hackers (crackers) frequently use snooping techniques and equipment such as keyloggers to monitor keystrokes, capture passwords and login information, and to intercept e-mail and other private communications and data transmissions. Corporations sometimes snoop on employees legitimately to monitor their use of business computers and track Internet usage; governments may snoop on individuals to collect information and avert crime and terrorism. Although snooping has a negative connotation in general, in computer technology snooping can refer to any program or utility that performs a monitoring function. For example, a snoop server is used to capture network traffic for analysis, and the snooping protocol monitors information on a computer bus to ensure efficient processing.


SEE HOW BIG ENTERPRISE's USED SNOOPING & WHY?

BIG Enterprise Data Governance Data masking hides information from testers: Start-up DataGuise enters the data masking market fueled by regulatory compliance pressures. One analyst says companies prefer masking over other techniques. Deperimeterization changing today's security practices: Royal Holloway authors explain how basic deperimeterization principles can ensure that security does not suffer when traditional boundaries are eroded.

Necessary Cooperation: The teaming of human resources and security pros is mission critical for protecting corporate data.



Frequently Asked Qestions:



Q : What is Spoofing/Snooping ?



Q : How to hack a pc ?



Q: Pls , tell me how can i protect my pc from malware/spyware?



Q : How to hack a cell phone or trace a cell phone ?



Q : How to track a spammer ?



So its not that easy for everyone , to intrude into someone elses computer. Hacking is Impossible on the net , becoz , one can use a public network



Like Internet , you can just able to see his IP Address & Domain. To hack a pc , you must have the physical address (MAC ADDRESS) of that machine , you want to Hack. MAC Address is unique for each single pc ( NIC : Network Intrface Card/Ethernet/Lan).



For more information , pls visit the sites given below.

For More Information pls visit our site



Sincerely
Gurbinder Sharma
IT Specialist/Security

No comments:

Post a Comment