Ask your app and mobile related questionStart a discussion in the Appszoom Forum and get the answers you needX Close

Am I Hacker Proof

Am I Hacker Proof

FREE

(4 stars)

(287)


Download for Android

50,000 - 100,000 downloads

Add this app to your lists
View bigger - Am I Hacker Proof for Android screenshot
View bigger - Am I Hacker Proof for Android screenshot
View bigger - Am I Hacker Proof for Android screenshot
View bigger - Am I Hacker Proof for Android screenshot
How do you know if your computer or network is truly hacker proof? Just because your home computer came with a firewall by Symantec or your IT manager installed a new Cisco Pix, that does not mean you are protected.

Unlike when someone breaks into your home or office and there are physical signs showing that you have become a victim of burglary, when a hacker breaks into your computer there are no obvious signs. Your mouse won't start squeaking and your keyboard will not start typing "I'm being hacked...HELP!"

In the movies, they portray a hacker (actor) sitting in front of a computer and within in seconds (not minutes) the hacker has hacked into a bank, government networks, his schools computer, his girlfriend laptop or a social media account like Facebook or Twitter.

In reality it does not work that way. Here are the 5 steps of computer hacking:

1. Reconnaissance (research) - Gathering information about the target. Just like a professional team who watches the video tapes of their opponents before game time, looking for the weakness and strength of their opponents, so does a hacker looking for the strengths and weaknesses in your network or website.
2. Scanning /Vulnerability check – This is what AmIHackerProof.com performs. AmIHackerProof.com scans website, computer or network just like a hacker would. Below is a list of scanning phases and checks AmIHackerProof.com performs.
3. Gaining Access – this is the penetration or hacking phase. Using the information found in #2 Scanning/Vulnerability check.
4. Maintaining Access – Once a hacker gains access, he wants to keep access. He does this by setting up backdoors, adding phantom accounts or even installing spyware.
5. Cover Tracks – What makes a “Great” thief is being able to sneak in and get out without leaving any trace. A “Great” hacker compared to an “ok” hacker can get in and out without leaving a trace.

For more information on computer hacking and the different stages click here to download the .PDF “Introduction To Ethical Computer Hacking.”

Tags: ctpnn, amihackerproof, am i hacker proof, “introduction to ethical computer hacking.”.

Comments and ratings for Am I Hacker Proof
  • (59 stars)

    by Zubaer Ahmed on 14/06/2014

    nice

  • (59 stars)

    by Monesh Sharma on 08/06/2014

    Poor doesnt work

  • (59 stars)

    by Layoung Away on 30/05/2014

    Not good

  • (59 stars)

    by wisdom kwabena Boadi on 18/04/2014

    Not bad I call it superimposed

  • (59 stars)

    by celso montanez on 18/02/2014

    Need more stuff

  • (59 stars)

    by Anas Mohamed on 02/02/2014

    Bullshit

  • (59 stars)

    by Sunthina Sun on 10/01/2014

    poor, not w