Nemo Wagging Tail

Kamis, 18 Januari 2024

USE OF CRYPTOGRAPHY IN HACKING

WHAT IS CRYPTOGRAPHY?

The Cryptography is derived from the Greek words "Kryptos". This is the study of secure communication techniques that allow only the sender and recipient of a message to view it's contents of transforming information into nonhuman readable form or vice versa is called cryptography.

As we know that information plays a vital role in running of any business and organizations etc, sensitive details in the wrong hands can leads to loss of business.

Cryptography is the science of ciphering and deciphering messages.To secure communication organizations use cryptology to cipher information .

                            Or

Cryptography is a method of protecting information and communication through the use of codes so that only those whom the information is intended can read and process it.

In Computer Science, Cryptography refers to secure information and communication techniques derived from mathematical concepts , a set of rule based calculations called algorithm to transform message in ways the hard to readable for human.

This is one of the secure way of communications for a hacker with the help of virtual private network(VPN) like Tor Browser which is also very helpful to change the IP Address(Location of the sender ) for illegal purpose to perform crime in cyberspace . I will discuss in brief about the VPN .



How to Encrypt and Decrypt the text in Cryptography?

Open this website with the help of internert surfing for encryption-"http://wwwmd5online.org" 

Open the link for Decrypt the code text-"http://www.md5online.org/md5-decrypt.html"

Type whatever you want for encryption and it will crypt in the code form, copy that code and forward to the intended person whom you want for secure communication and then he/she will Decrypt in the real form.




               
       







Related posts


  1. Ethical Hacker Tools
  2. What Is Hacking Tools
  3. Ethical Hacker Tools
  4. Hacker Tools Software
  5. Pentest Tools Port Scanner
  6. Nsa Hack Tools
  7. Game Hacking
  8. Hacking Tools Windows 10
  9. Computer Hacker
  10. Nsa Hacker Tools
  11. Hacker Tools Free Download
  12. Hack Tools For Ubuntu
  13. Hacker Tools Software
  14. Best Hacking Tools 2019
  15. Hack Tools
  16. Hacking Tools Software
  17. Pentest Tools For Ubuntu
  18. Physical Pentest Tools
  19. World No 1 Hacker Software
  20. Best Hacking Tools 2019
  21. Hacker Tools For Pc
  22. Hacking Tools For Beginners
  23. Hacking Tools Free Download
  24. Hacking Apps
  25. Blackhat Hacker Tools
  26. Hack Tools Download
  27. Tools Used For Hacking
  28. Hacking Tools 2020
  29. Hacker Tools For Windows
  30. Beginner Hacker Tools
  31. Hacker Tools Hardware
  32. Pentest Tools Github
  33. Hacker
  34. Hacking Tools Hardware
  35. Kik Hack Tools
  36. Hacker Tool Kit
  37. Best Hacking Tools 2019
  38. Hacking Tools Windows
  39. Pentest Tools Windows
  40. Kik Hack Tools
  41. Growth Hacker Tools
  42. Bluetooth Hacking Tools Kali
  43. Hacker Tools Apk
  44. Tools 4 Hack
  45. Pentest Tools Website
  46. Nsa Hack Tools
  47. Hacker Tools Free
  48. Nsa Hacker Tools
  49. Hacking Tools For Pc
  50. Pentest Tools For Android
  51. Best Hacking Tools 2019
  52. Hacking Tools Name
  53. Hacking Tools For Pc
  54. Hacking Tools And Software
  55. Pentest Tools List
  56. Hacker Tools Free Download
  57. Hack Tools Download
  58. Ethical Hacker Tools
  59. Hacker Tools 2019
  60. Tools Used For Hacking
  61. Best Pentesting Tools 2018
  62. World No 1 Hacker Software
  63. Hacking App
  64. Hacking Tools For Windows
  65. Kik Hack Tools
  66. Hack Tools
  67. Hacker Tools Free
  68. Hack Tools
  69. Pentest Tools Review
  70. Hacker Tools 2019
  71. Tools For Hacker
  72. Hacking Tools 2019
  73. Hacking Tools For Beginners
  74. Pentest Tools Review
  75. Usb Pentest Tools
  76. Hacker Tools Free
  77. Termux Hacking Tools 2019
  78. Hacker Tools Hardware
  79. Hacker Tool Kit
  80. Hack Rom Tools
  81. Hacker Tools Hardware
  82. How To Hack
  83. Pentest Tools
  84. Hacker Tools For Mac
  85. Hacking Tools For Pc
  86. Underground Hacker Sites
  87. What Are Hacking Tools
  88. Hacking Tools For Windows 7
  89. Hacker
  90. Nsa Hack Tools
  91. Hacker Tools Windows
  92. Pentest Tools Find Subdomains
  93. Hacking Tools Windows
  94. Easy Hack Tools
  95. Hack Tools Github
  96. What Is Hacking Tools
  97. Hack Tools Download
  98. Pentest Tools

Tidak ada komentar:

Posting Komentar