Overview of Hacking
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: Hacking and hacker are terms that generally tend to have negative effect on people. These days, largely due to popular media most people wrongly think of hackers as computer criminal and the person who doing something mischievous things in other computer, delete data, damage os & steal password and cause harm to system release viruses etc. “Hacker” is not computer criminal. The tech community now distinguishes between hackers, who identify security flaws in order to improve computer systems and crackers, who attempt toexploit those flaws to their own advantage. Now different sides of hacking is discussed.
Authors and Affiliations
Sova Pal (Bera)
Image Restoration - A Survey
Abstract: Image restoration is the process of restoring the degraded or corrupted image back to its original form. It is the initial step of image processing. Noise is added in the image while sending an image from...
Auto-Scaling, Load Balancing and Monitoring As service in public cloud
Abstract: Cloud computing[1][2][3] word has changed the classical computing environment in IT industries. it is most emerging & popular technology in IT & research field because of its great feature such as...
Performance Comparison of K-means Codebook Optimization using different Clustering Techniques
Vector quantization is a compression technique which is used to compress the image data in the spatial domain. Since it is a lossy technique, so maintaining the image quality and the compression ratio is a diffic...
Management Support System (Mss) In Higher Educational Institutions (Heis): University Of Jos, Nigeria. Ict Support
Abstract: Management support system is of great importance in the institutions of higher learning, as an interactive computer-base system that support cooperate memory or knowledge base that constitutes the problem-solvi...
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
These days privacy preservation topic is based on one of the heated topics of data mining today. With the development of data mining technology, an increasing number of data can be mined out to reveal some potent...