Focus on challenges in ethical hacking

Solutions may lead to another problem, says expert

September 09, 2013 03:42 pm | Updated June 02, 2016 10:39 am IST - VISAKHAPATNAM:

Ethical hacker and writer Ankit Fadia presenting a power point presentation on computer security at a workshop in Visakhapatnam on Sunday. Photo: A. Manikanta Kumar

Ethical hacker and writer Ankit Fadia presenting a power point presentation on computer security at a workshop in Visakhapatnam on Sunday. Photo: A. Manikanta Kumar

How about finding your lost or stolen mobile phone yourself? Stop others accessing your personal records and files on your system; locate your vehicle at the parking lot in case if you had lost track of it; track where your friend stays; this and many more can be done either using an application or installing a software. When well-travelled ethical hacker and writer Ankit Fadia covered a gamut of topics about the other side of the digital world organised by CrazyHeads, the young audience, who filled the hall, made a note of the websites and relevant information which prevent them from getting hacked. On Sunday, Ankit spoke at length on how easily and instantly victims’ passwords can be hacked. “Staying in Mumbai remotely, one can infect the other system in a different location, send texts or make the files completely inaccessible to the user or decode the passwords of all necessary documents,” he said.

Explaining about the challenges in ethical hacking, he said, the solutions that were offered in ethical hacking might always lead to another problem. From decrypting the dotted password without use of any software to denying the access of personal information to other users and blocking and unblocking websites, the day-long session took the junior, degree and engineering college students, who came from Vizianagaram, Srikakulam and the city, through an interesting power point presentation to help control hacking. Ankit warns the mobile users against mobile phone spying. “In just a few minutes, an invisible icon ‘keylogger’ can be downloaded in your handset where the hacker can view or track your call logs, texts, so on and so forth. So, next time when your friend says that he or she wants to make a call from your mobile think twice.” He then explained how onion routing helps in encrypting the communication. “But there is no 100 per cent guarantee where ethical hacking is concerned and there is always a flip side to it which needs to be focused,” said Ankit. The team of CrazyHeads S. Vaibhav, Bharat, K. Bala Krishna, and Vineet were present.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.