Hackers are categorized into the following classes:

* Black Hat Hackers (Crackers): These are persons who are computer specialists and use their hacking skills to carry out malicious attacks on information systems.
* Gray Hat Hackers: These are persons who sometimes do not break laws and help to defend a network, but sometimes act as Black Hat Hackers.
* White Hat Hackers (Ethical Hackers): These are persons who have excellent computer skills and use their knowledge to secure information systems.
* Security Providing Organizations:
Some organizations and communities also provide security to information systems.

Explore More

DoS vulnerabilities

Denial Of Service Overview DoS or Denial Of Service vulnerabilities will occur if there is some type of bottleneck within the software application. This could cause excessive cpu usage, memory

Critical Blind SQL Injection (vulnerability) in The Best Myanmar Website (burmeseclassic.com)

PlanetCreator has reported another critical Blind SQL Injection (vulnerability) on http://www.burmeseclassic.com/ This vulnerability has been alerted to :- Webmaster of BurmeseClassic Applications: ———— PlanetCreator’s_Universal_Advanced_Internet_Security_T00L System Time: ———— (UTC+08:00) Yangoon, Myanmar

What are the user authentications supported by the SSH-2 protocol?

The SSH-2 protocol supports the following user authentications: * Public key authentication (DSA, RSA*, OpenPGP) * Host-based authentication * Password-based authentication Note: SSH-1 supports a wider range of user authentications,