Posts

Sim card Cloning

Phone cloning is copying cellular identity from one to another Types of sim cloning         ->CDMA cloning         ->GSM cloning CDMA cloning: code division multiple access (CDMA) mobile telephone cloning involves gaining access to the device's embedded file system  /nvm/num directory via specialized software or placing a modified  EEPROM  into the target mobile telephone, allowing the electronic serial number  (ESN) and/or mobile equipment identifier  (MEID) of the mobile phone to be changed. To obtain the MEID of your phone, simply open your phone's dialer and type *#06# to get its MEID number.  The ESN or MEID is typically transmitted to the cellular company's mobile telephone switching office (MTSO) in order to authenticate a device onto the mobile network. Modifying these, as well as the phone's prefered roaming list (PRL) and the mobile identification number , or MIN can pave the way fo...

Wireless Network Security

Image
Wireless Networking Security � �those who would sacrifice freedom for security deserve neither� � Benjamin Franklin Why go wireless The popularity of wireless network is clearly on the increase. But what are the hidden costs of going wireless? Are we giving up our security? The main benefits of wireless networking are: cost convenience The main drawbacks are: speed security General Security Issues of Wireless Networks Network security issues, whether wired or wireless, fall into three main categories: availability, confidentiality and integrity: Confidentiality:  is the information being sent across the network transmitted in such a way that only the intended recipient(s) can read it. Integrity:  is the information reaching the recipient intact Availability:  is the network available to users whenever it is supposed to be Confidentiality The main way to ensure that data is not disclosed to unauthorised users is by encrypting it during...

DIGITAL SIGNATURE

What Is a Digital Signature? Digital Signature is a process that guarantees that the contents of a message have not been altered in transit. When you, the server, digitally sign a document, you add a one-way hash ( encryption ) of the message content using your public and private key pair. Your client can still read it, but the process creates a "signature" that only the server's public key can decrypt. The client, using the server's public key, can then validate the sender as well as the integrity of message contents. Whether it's an email an online order or a watermarked photograph on eBay if the transmission arrives but the digital signature does not match the public key in the digital certificate, then the client knows that the message has been altered. How does a Digital Signature Work? The digital signature can be considered as a numerical value that is represented as a sequence of characters. The creation of a digital signature is a...

NETWORK SECURITY

Network security  consists of the  policies  and practices adopted to prevent and monitor  unauthorized  access, misuse, modification, or denial of a  computer network  and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protec...