Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/1564
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBhatt, Chintan Maheshbhai-
dc.date.accessioned2010-06-12T05:43:50Z-
dc.date.available2010-06-12T05:43:50Z-
dc.date.issued2010-06-01-
dc.identifier.urihttp://hdl.handle.net/123456789/1564-
dc.description.abstractNetwork Security is now a days a big issue for the big industries,companies because if there are any loopholes in their computer network then whole database can be accessed by other hackers which may create a big problems to companies.So here are some techniques given through which we can access that database and also security part is there to avoid this unauthorized login.This report presents techniques of pen- etrating the computer network. Here I am working with the di erent methods of penetration of network like SQL injection, Trojan intrusion system, Email tracing system, Code injection attacks. Here I am not dealing with all kind of Attack, but I am working with some most famous methods which are used mostly. I am working with Email Tracing System which helps to nd out the email root.Here also some details are given for encryptor which is used to encrypt the Trojan and most of mal- ware type les which have to be sent over the network. Here I am also creating some algorithms which encrypts the le means adds extra bits to the digital signature of that secret le to make them undetectable in Antivirus system. I am also building password hacking algorithm to crack the password.Here I will show a demo of LAN gaming through which any ones computer can be attacked.There is bright scope be- hind this terminology because if your system is not secure then your data can be theft and your organization will be in loss. So security is the main policy behind this ethical hacking." The person who can hack only that can secure the network". So securing the network is also an important task. Big companies have large no of hackers.en
dc.language.isoen_USen
dc.publisherInstitute of Technologyen
dc.relation.ispartofseries08MECC03en
dc.subjectEC 2008en
dc.subjectProject Report 2008en
dc.subjectEC Project Reporten
dc.subjectProject Reporten
dc.subjectEC (Communication)en
dc.subjectCommunicationen
dc.subject08MECCen
dc.subject08MECC03en
dc.subjectCommunication-
dc.subjectCommunication 2008-
dc.titlePenetrating Computer Networks and providing Security by means of Ethical Hackingen
dc.typeDissertationen
Appears in Collections:Dissertation, EC (Communication)

Files in This Item:
File Description SizeFormat 
08MECC03.pdf08MECC033.91 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.