!"Security, Hacking, Privacy"! When my site is complete you will have more information to understand the procedures I take when you hire me for security services. Till then you can discuss with me verbally or by email your interest. When
completed, this page will provide you extreme detail of the firewall
services, anti-virus solutions, and network penetration scans that
I can perform on your network. I consider myself an Ethical Hacker.
What this means is " I studied the traits of hackers and how they
penetrate systems, just so I can learn how to hack and defend from
those attacks. To defend yourself from the ENEMY you must see through
the ENEMY's eyes". I use the same tools that hackers/crackers use
just so I can see what they will see on your network. For example
lets say you are the victim to a tcp, udp or icmp scan. If I detect
any open ports on your computers. I will then run vulnerability scanners
to see if those services/ports that are running is EXPLOITABLE by
a hacker. Read what IBM has to say about ETHICAL HACKING http://www.ibm.com/Search?v=11&lang=en&cc=us&q=ethical+hacking |
|
|||||||||||||||||||
|