Methods to Attack your Computer Information
Phishing Session hijacking Password cracking Sniffing Direct physical access to an uncontrolled machine Exploiting default accounts Social engineering Social Networking
Phishing Session hijacking Password cracking Sniffing Direct physical access to an uncontrolled machine Exploiting default accounts Social engineering Social Networking
¨Network is group of computers that are linked in order to share files and resources (such as printers and CDs), exchange files, or allow electronic communications.
POS (point of sale), at which a customer makes a payment to the merchant in exchange for goods or services A point-of-sale (POS) system, combination of POS software and hardware, it is a computer replacement for a traditional cash register. Capabilities of a POS system includes customer management, order management, inventory management, report generation, credit…