Hackers are categorized into the following classes:

* Black Hat Hackers (Crackers): These are persons who are computer specialists and use their hacking skills to carry out malicious attacks on information systems.
* Gray Hat Hackers: These are persons who sometimes do not break laws and help to defend a network, but sometimes act as Black Hat Hackers.
* White Hat Hackers (Ethical Hackers): These are persons who have excellent computer skills and use their knowledge to secure information systems.
* Security Providing Organizations:
Some organizations and communities also provide security to information systems.

Explore More

SQL Injection Attacks and Prevent

Introduction Security in software applications is an ever more important topic. In this article, I discuss various aspects of SQL Injection attacks, what to look for in your code, and

Methods of Making Your Trojans/Bots F/Undetecable

1. Crypters/Binders. This is By far the most Common Way to Make Your Trojan Undetectable. Almost everyone Who Makes There Trojans Undetectable Uses a Public Crypter, My First Public Crypter,

Critical SQL Injection in The Venerable Mahasi Sayadaw’s Website

PlanetCreator has reported another critical SQL Injection (vulnerability) on The Venerable Mahasi Sayadaw’s Website http://www.mahasi.org.mm SQL injection is a code injection technique that exploits a security vulnerability occurring in the