scholarly journals Android Hacking in Kali Linux Using Metasploit Framework

Author(s):  
Abhishek Arote ◽  
Umakant Mandawkar

IT Security is a major concern of the internet as almost all communication takes place over the internet today. The purpose of penetration testing is to ensure that the system and network do not have a security breach that could allow unauthorized access to the system and network. A possible and appropriate way to prevent system and network hacking is penetration testing. The document outlines some basic concepts of penetration testing, evaluating existing tools and exploits, and using the Metasploit framework for penetration testing and running exploits within the framework and tools.

Author(s):  
Praveen Pandey

Abstract: Cyber security are techniques generally set forth in published materials that attempt to safeguard the cyber environment of a user or organization. It manages the set of techniques used to save the integrity of networks, programs and data from unauthorized access. It refers to the body of technologies, processes, and it may also be referred to as information technology security. The field is of growing importance due to increasing reliance on computer systems, including smart phones, televisions and the various tiny devices that constitute the Internet of Things. Keywords: IT security, Internet of things (IOT)


Author(s):  
Nurbaiti Nurbaiti ◽  
Nadhrah Al Aflah ◽  
Supardi Supardi

Almost all corners of the world have been affected or affected by this Covid-19 virus disease, even some countries have set a lockdown status and other anticipations for the spread of the Covid-19 virus. The alternative used in this bold learning activity system is to utilize the internet network, namely the Zoom Meeting and Classroom application. This study aims to determine students' perceptions of the use of internet networks such as zoom meetings and classrooms used and how effective learning is during the Covid-19 pandemic. The research conducted here uses descriptive qualitative research methods. And the results of this study indicate that the zoom application is an application that is very effective and preferred by students because it is easier to use and very efficient when the learning process is bold and shows that some students who give their perception of the application used during learning that are brave are the Zoom Meeting application, namely the application. Zoom Meeting. by 66.7%, followed by the Google Meet application at 22.2% and the Classrom application at 11.1%.  


2021 ◽  
Vol 30 (1) ◽  
pp. 37-53
Author(s):  
Ivan Drenovski ◽  

The article analyses the content of the video lessons and corresponding to them test items in Geography and Economics for 8 th grade, available for a fee, on the educational site "Ucha.se". The studied curriculum is related to the introduction of basic concepts and explanations of key processes studied by geology, geophysics, astronomy, geochemistry, geomorphology, meteorology, climatology, hydrology, biology and other sciences. There are serious lapses in the scientific reliability and correctness of the given statements in almost all lessons. Examples of factual errors, incorrectly asked questions, inaccurate images and pseudo-scientific simplifications are pointed.


10.23856/4325 ◽  
2021 ◽  
Vol 43 (6) ◽  
pp. 198-203
Author(s):  
Oleksii Kostenko

The scale, speed and multi-vector development of science and technology are extremely effective in influencing legal, economic, political, spiritual, professional and other social relations. The development of information and communication technologies, the use of the Internet, the creation, storage, transmission, processing and management of information became the driving forces of the new scientific and technological revolution. This facilitates the introduction of technologies for the transmission and use of information in digital form in almost all spheres of public life, namely text data, photo, audio, video images, which are transmitted in various ways via the Internet and other systems and means of communication. One of the key elements of data transmission technologies and systems is the availability of information by which it is possible to identify their subjects and objects by their inherent identification attributes. In Ukrainian legislation, in particular in the Law of Ukraine «On Personal Data Protection», information or a set of information about an individual who is or can be identified specifically is defined as personal data. However, despite its modernity, this law still contains a number of shortcomings and uncertainties, both in terminology and in the legal mechanisms for working with data by which a person can be identified, i.e. identification data.


2018 ◽  
Vol 189 (4) ◽  
pp. 46-59
Author(s):  
Marian Kopczewski ◽  
Agnieszka Napieralska

The 21<sup>st</sup> century is undoubtedly a period of enormous progress in the field of digital technology, a period in which the boundary between the real world and the virtual world becomes less and less visible. The Internet has undeniably become a facilitation of everyday life, since it is a tool of work, communication or a way to spend free time for many users. The virtual world is present in almost all areas of our lives, and people spend more and more time in front of the computer screens, operating websites, e-mails or social networks. Highly developed digital technology is a boon of the 21st century, but despite its numerous advantages, negative aspects are also visible. Virtual knowledge displaces physical interpersonal contacts; physical activity is replaced by spending free time in front of a computer monitor. Various threats (social, psychological, psychological, ethical and moral) resulting from modern digital technologies and the increasing degree of dependence on them are extremely significant. The authors of this article present the results of own research, aiming at making the reader aware that there are both positive and negative aspects of the virtual world.


2019 ◽  
Vol 2 (1) ◽  
pp. 90 ◽  
Author(s):  
Annisa Dwi Kurniawati

Abstract: The development of technology flows is increasing. The internet, which was initially used by several groups as a medium for the transformation of scientific and academic data, has now been used in almost all aspects of people's lives, including e-commerce transactions. E-commerce transactions are transactions carried out without meetings between parties. By using e-commerce, many reservations are obtained from the seller or buyer. The convenience offered doesn't mean it doesn’t rise the problems. For Muslims, understanding the status of e-commerce transactions is important. E-commerce accepts payments with bai’s-salam, which is about non-related transactions and the suspension of goods for payments that have been hastened. It's just that if on Bai 's-Salam a face-to-face meeting is held for the implementation of sighat, it is different with e-commerce that communicate only through chat. E-commerce is permitted in Islam with a note that there is no riba ',gharar, maisir, etc. Therefore, if it is approved by the payment system on e-commerce, it is asked not to use a credit card to avoid riba’.الملخص: يشهد تطوير تدفقات التكنولوجيا زيادة هائلة. يستخدم الإنترنت في جميع جوانب حياة الناس تقريبًا ، بما في ذلك معاملات التجارة الإلكترونية، معاملات التجارة الإلكترونية هي معاملات تتم بدون اجتماع بين الطرفين .باستخدام التجارة الإلكترونية، الكثير من السهولة حصلت من البائع أو المشتري. يتم تقديم التسهيلات المقدمة. التسهيلات المقدمة لايمكن تسبب مشاك. معلومات المسلمين عن حالة المعاملة التجارة الإلكترونية شيء مهمة. التجارة الإلكترونية مثل بيع السلام هي عن العناصر فى المعاملات وتأخير القبض دفعت مقدما. إذا كان بيع السلام يتم عقد اجتماع وجها لوجه في تنفيذ سيغات تختلف عن التجارة الإلكترونية استخدام التواصل مع الدردشة. التجارة الإلكترونية مباحات في الإسلام مع ملاحظة عدم وجود عناصر الربا والغرار والميسر وغيرها لذلك ، إذا كانت مرتبطة بنظام دفع في التجارة الإلكترونية المستحسن عدم استخدام بطاقة الائتمان لتجنب الربا.. Abstrak: Perkembangan arus teknologi mengalami peningkatan yang masif. Internet yang pada awalnya digunakan oleh beberapa kalangan sebagai media transformasi data ilmiah dan akademik, kini telah digunakan di hampir seluruh aspek kehidupan masyarakat, termasuk transaksi jual beli (e-commerce). Transaksi e-commerce merupakan transaksi yang dilakukan tanpa adanya pertemuan antar para pihak. Dengan menggunakan e-commerce, banyak kemudahan yang diperoleh baik dari pihak penjual maupun pembeli. Kemudahan yang ditawarkan bukan berarti tidak menimbulkan masalah. Bagi kaum muslim, mengetahui status dari transaksi e-commerce merupakan hal yang penting. E-commerce  memiliki kesamaan dengan bai’ as-salam yaitu mengenai unsur-unsur terjadinya transaksi serta adanya penangguhan barang untuk pembayaran yang telah disegerakan. Hanya saja, jika pada bai’ as-salam dilakukan pertemuan face to face untuk pelaksanaan sighat, berbeda halnya dengan e-commerce yang melakukan komunikasi via chatting. E-commerce diperbolehkan dalam Islam dengan catatan tidak adanya unsur riba’, gharar, maisir, dsb. Oleh karena itu, jika dihubungkan dengan sistem pembayaran pada e-commerce, maka dianjurkan tidak menggunakan kartu kredit guna menghindari terjadinya riba’.


2014 ◽  
Vol 8 (2) ◽  
pp. 29-34
Author(s):  
Alin Teodorus Drăgan

Hacking involves the attempt to compromise the security of a computer system in orderto gain unauthorized access. In the course of time it has turned out that the Internet is avulnerable system, and this has generated a framework for criminal activities, resulting in theemergence of new crimes, among which computer fraud.


2021 ◽  
Vol 4 (3) ◽  
pp. p1
Author(s):  
To Phuong Oanh

This paper aims to investigate the prevalence of cyberbullying among Vietnamese adolescents. Special emphasis was placed on gender differences regarding different forms of cyberbullying and victimization. In this study, 200 middle school students from four state schools in Vietnam were online surveyed to obtain information about the prevalence of cyberbullying and victimization. The results show that most of the students used the Internet daily and that almost all of them possess mobile telephones. On average, 7% of students reported that they have cyberbullied others online, whilst 14% of them were victims of cyberbullying. The most common types of victimization reported by students were harassment including “prank or silent phone calls” or “Insults on instant messaging and website”. There were not any significant gender differences in cyberbullying and being victimized by cyberbullies than females.


2019 ◽  
Vol 2 (2) ◽  
pp. 113-118
Author(s):  
Realize Realize ◽  
Tukino Tukino

Home industry production results are only traditionally managed as promoted by word of mouth, and sometimes rely solely on the number of visitors to the sales place of the product, so the product takes a long time to increase sales volume. Now with capitalize a set of computers or smartphones that have been equipped with the Internet network can be used as a tool or media to publish all activities / promotional activities undertaken by the domestic business actors. In this activity, business activists will be given material about what the website, especially weblog and its benefits, how to make it, and how to use and manage it properly to support and improve the ability in promoting the product. This is not without reason, because almost all citizens who already have a household business is less understand the use of the internet let alone use the Internet media as one of the media to promote household products that they produce. The main target in the implementation of community service activities is to improve the ability of the community in the utilization of the Internet as a powerful medium as a partner of the government in moving the economic factors.


Author(s):  
Г.С. Мокану

Угрозы информационной безопасности в компьютерных сетях стали одной из основных проблем для владельцев ПК. При этом особое распространение этих угроз коснулось сетей WI-FI, в которых происходит как несанкционированный доступ к данным, так и только снижение уровня защиты сети. Практически все современные мобильные устройства (смартфоны, планшеты, ноутбуки и нетбуки) имеют возможность подключения к беспроводному Интернету или, точнее, к сети WI-FI, эта функция теперь является стандартной для этих устройств. nformation security threats in computer networks have become one of the main problems for PC owners. At the same time, a particular spread of these threats affected WI-FI networks, in which both unauthorized access to data and only a decrease in the level of network protection occur. Almost all modern mobile devices (smartphones, tablets, laptops and netbooks) have the ability to connect to the wireless Internet or, more precisely, to the WI-FI network, this function is now standard for these devices.


Sign in / Sign up

Export Citation Format

Share Document