Skip to main content

SoFi - A Robofish to capture Marine life

As the world moving towards the Robotics and Automation, here comes a SoFi - which is called a Robofish developed by Computer Science students of MIT college which can swim in the open water along with the marine creatures. They are now secret agencies for capturing the marine life in recent times. Click here for knowing more details about how a SoFi work in the water. This is the first robotic fish in all 3 dimensions for extended period of time. It is more excited to get about the possibility of getting a system like this to get closer to marine life than humans can get on their own. SoFi can handle upto a deep of 50 feet for 40 mins. It is strong enough to push back the currents and can take high resolution photos. Using a waterproofed super Nintendo controller, it can dive in straight line, turn, dive up or down. The materials for building up SoFi is understood in the video shown above in the link. The robot is capable of close observations and interactions with marin...

What is Ethical Hacking and types of Ethicl Hackers

When it comes to cyber security they are many types of hacking (for more detail click hear), the person who use his hacking skills to perform a good reason called "Ethical hackers ", they called also CEH (certified ethical hackers).

How does they works?

The normal hacking is done by targeting weakness of computer, so computers well hacked easily and the hackers never told the weakness of our computer. But Certified Ethical Hackers have permission to access your network or computer and they well hack the out side of the computer like black hate hackers to find the weak part of your computer, then they well sujest to strong that part of program. Most the companies like Banking and credit card business are spend million dollars of money to Cyber Security, because if they attacked by black hat hackers they well loose huge amount of money and steal information of customers.

"You can call Ethical hackers as a doctor of computer"

Types of Ethical Hackers

CEH can divided into three types

1. Information Security Analyst
2. Security Engineer
3. Penetration Tester


In short terms

1. Information Security Analyst : This engineers can install the firewall software to the network or computer to protect. Information Security Analyst well taking the part of protection

2. Security Engineer : Security engineer specialized in engineering they well take care of security aspects in design of network or system

3. Penetration Tester : Penetration testing also called pen testing.
The work of pen tester is checking the computer system, network or Web application to find vulnerabilities that an attacker could exploit.

Resources for Becoming a Certified Ethical Hacker
Their are so many institute to get certified in Ethical Hacking
Popular websites for education in ETHICAL HACKINGS are listed below

EC-Council

InfoSec

This is all about Ethical hacking and types of Ethical hackers. I hope enjoying this post of enjoyed then share this post with your friends

Comments

Post a Comment

Popular posts from this blog

Ransomware a boon to Windows Users

May 12th 2017 saw the biggest ever cyber attack in Internet history (yes, bigger than the Dyn DDoS).  A ransomware named WannaCry stormed through the web, with the damage epicenter being in Europe. What is Ransomware? Ransomware is a sophisticated piece of malware that blocks the victim’s access to his/her files, and the only way to regain access to the files is to pay a ransom. There are two types of ransomware in circulation: Encryptors, which incorporates advanced encryption algorithms. It’s designed to block system files and demand payment to provide the victim with the key that can decrypt the blocked content. Examples include CryptoLocker, Locky, CrytpoWall and more. Lockers, which locks the victim out of the operating system, making it impossible to access the desktop and any apps or files. The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer. Examples include the police-themed ransomware or Winlock...

What is Android platform

In day-today life smartphones are placing a important role.You can make phone call,text with your friends, social media updates much more,so the topic is most of the smart phone having the platform Android so that type of device Is called Android devices. So in this post we will give some knowledge of android software and information about device * What is Android Android is a operation system which can be wildly use in smart phones,not only a operating system middleware and key applications. Android Inc was founded in Palo Alto of California, U.S. by Andy Rubin, Rich miner, Nick sears and Chris White in 2003. Later Android Inc. was acquired by Google in 2005.  Bonus:- how to run android in pc * Features & Specifications Android is a powerful system and OS supporting large number of application on it.Hardware that support android is mainly based on ARM architecture * Downloading and Developers  Android is own app which preloaded in software called Play ...

What is Computer Hacking and types of Hacking

Hacking is a technical effort of manuplating the normal network connection and connected systems. A hacker is person who engaged in hacking. In other words 'hacker' who discover a weak part of network and utilize yo exploit block access to regular users, download information, or to gain access to more computers in the network. A good hacker who hack the compute for good intention is called '' Cracking " Types of "Hackers" Based upon the intention and behavior of hacker we can classified into seven (7) types, it means their are 7 types hackers 1. Script Kiddie 2. White hat ( Certified ethical hackers) 3. Black hat 4. Gray hat 5. Green hat 6. Red hat 7. Blue hat In short terms  1. Script kiddie : Script Kiddies normally don’t care about hacking , they ate copying the code and use it for a virus or an SQLi or something else. 2. White hat hacker : This hacker popularly known as Ethical hacker or Certified Ethical Hacker/Hackers. It mea...