A Theoretical Analysis of Different Hacking Techniques in Wireless Networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 9
Abstract
Over the course of past few decades to today's world, even though the usage of computers is increasing rapidly, the users hesitate to store their personal information in their computers because of the security issues of computing. The security issues are embossed because of the hackers. Hackers are also the programmers who unethically make use of our personal information, they may steal it and use for some unwanted purpose. They are greatly motivated by a massive amount of profit, challenge, strong efforts, to assist in performing illegal activities. All hackers do not follow a same technique to perform illegal tasks. It will vary depending upon the security of information and the depth of the content involved in it. There are a large number of hacking techniques available in wireless networks. In this theoretical analysis, the systematic methodology of various techniques that the hacker follows to attack a machine or sensitive information of the users has been scrutinized.
Authors and Affiliations
Mr. S. Manimaran , S. Kaviya , S. Josphin Anitha , S. Meiyappan
DYNAMIC ANALYSIS OF LOCATION TRACKING USING MICROADDRESS RECORDER
The Location Tracking can be considered as one of the most advanced, innovative and practical Location based Services. A place is very important entity to a user with a semantic meaning such as “You are at your Home”,” Y...
Security against attacks in TOR networks
TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traf...
A Taxonomy of High Level Software Clones
The idea of software clones is linked with similarity, which can occur at various levels of abstraction. Simple clones i.e. clones at lower levels of abstraction are classified in literature, however; high level clones a...
A HYBRID APPROACH FOR CLUSTERING BASED ON COMBINATIONAL ALGORITHMS
Data clustering helps one discern the structure of and simplify the complexity of massive quantities of data. It is a common technique for statistical data analysis and is used in many fields, including machine learning,...
An Improved Algorithm for Text Document Clustering
Due to the advancement of internet, the volume of the electronic documents available on the web is increasing day by day. Document clustering plays important role in organization and summarization of these documents. Thu...