Section III: Network Hacking; 8. Computer-to-Computer Communications; 9. Firewalls; 10. DRDoS Destributed Reflection Denial of Service; 11. Common Hacking Tools and techniques; 12. Defending Against the Hack;
DESCRIPTION
The internet has revolutionise the entire technology domain, but this revolution has proved to be both a blessing and a curse. If on one hand it has given the human civilization it's most marvellous tool, on the other it has made the computer systems vulnerable. Hacking if misused can create a havoc in the form of slow processing, service disruption, system failures. In this text we have tried to unearth the very basis of hacking and how organizations can protect their larger interest with this knowledge. The text is meant to provide a potent armour to the organizations connected with the internet.