Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Seven Habits Of Highly Malicious Hackers

  • Please log in to reply
No replies to this topic

#1 no one

no one

  • Members
  • 843 posts
  • Gender:Male
  • Location:PCLinuxOS Land
  • Local time:02:33 PM

Posted 21 May 2007 - 12:21 AM

MAY 18, 2007 | You can't defend against the cyber enemy if you don't know his movements or how he thinks.

Sanjay Bavisi, president of security certification, training, and education organization EC-Council, at Interop Las Vegas next week will demonstrate step-by-step how a typical black-hat hacker executes an attack -- from reconnaissance to covering his tracks -- in the "Seven Habits of Highly Malicious Hackers" presentation on Thursday.

Bavisi also will provide tips on how to protect yourself from each step, as well as a peek into the hacker psyche. He says he'll also show a case study of a hack with national security implications, and how ethical hacking is a successful way to stem attacks.

"Not everything that counts can be counted, and not everything that can be counted counts."

"Whoever fights monsters should see to it that in the process he does not become a monster"

Posted Image

BC AdBot (Login to Remove)


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users