tag:blogger.com,1999:blog-2085771970779369940.post8137015553232439067..comments2024-03-19T00:05:10.332+05:30Comments on Parimala Hariprasad: Social Engineering AttacksParimala Hariprasadhttp://www.blogger.com/profile/15304352526906191995noreply@blogger.comBlogger9125tag:blogger.com,1999:blog-2085771970779369940.post-38723512506033859762013-07-09T17:11:22.973+05:302013-07-09T17:11:22.973+05:30Awesome article..!
Loved the way you explained.Awesome article..!<br /><br />Loved the way you explained.Swamynoreply@blogger.comtag:blogger.com,1999:blog-2085771970779369940.post-76856646527552115352013-07-09T17:09:44.449+05:302013-07-09T17:09:44.449+05:30Awesome article...!
Loved the way you explained.Awesome article...!<br /><br />Loved the way you explained.Swamynoreply@blogger.comtag:blogger.com,1999:blog-2085771970779369940.post-67848053577569568292012-02-28T13:09:12.020+05:302012-02-28T13:09:12.020+05:30Social engineering, in the context of security, is...Social engineering, in the context of security, is understood to mean the art of manipulating people into performing actions or divulging confidential information.[1] While it is similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victims.Restaurant Softwarehttp://www.epospos.com/noreply@blogger.comtag:blogger.com,1999:blog-2085771970779369940.post-7280066785972604872011-12-20T21:59:06.845+05:302011-12-20T21:59:06.845+05:30Social Engineering Attacks need to be practiced co...Social Engineering Attacks need to be practiced consistently. I have victimized people who said, "Come on man you cannot plot an attack on me" and finally they were victimized. To not become a victim or to make someone a victim it requires a lot of practice.<br /><br />For those who want to pitch into Hacking, I would recommend to start with "Hacking For Dummies". You could search for it at http://issuu.com/ :) Happy hacking.<br /><br />-- Santhosh Tuppad<br />http://tuppad.com/blog/ | http://bangalorehackers.com/Santhosh Tuppadhttps://www.blogger.com/profile/15798739919129502021noreply@blogger.comtag:blogger.com,1999:blog-2085771970779369940.post-63106505560530865532011-12-20T19:45:13.483+05:302011-12-20T19:45:13.483+05:30Found ur blog yesterday!:)
This blog is so much in...Found ur blog yesterday!:)<br />This blog is so much in understandable words, very great for a newbie like me :)<br />Thanks sooo much!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-2085771970779369940.post-63190214412144823302011-12-19T18:13:37.795+05:302011-12-19T18:13:37.795+05:30Article is really a eye opener for all :) thank u ...Article is really a eye opener for all :) thank u Parimala for posting such a important topic in such a easy understandable wordings.Amith Dayanandnoreply@blogger.comtag:blogger.com,1999:blog-2085771970779369940.post-11276135402193650922011-12-15T20:46:26.144+05:302011-12-15T20:46:26.144+05:30@Madhu
Thanks a lot! I'll be posting a few upd...@Madhu<br />Thanks a lot! I'll be posting a few updates to this blog in a while. Watch this space.<br /><br />@Ananda Jothi<br />Thank You<br /><br />Regards,<br />PariParimala Hariprasadhttps://www.blogger.com/profile/15304352526906191995noreply@blogger.comtag:blogger.com,1999:blog-2085771970779369940.post-63934355842883511322011-12-12T14:25:05.973+05:302011-12-12T14:25:05.973+05:30Good article. Fine draft of the most needed tips t...Good article. Fine draft of the most needed tips to thwart the security attacks at various arenas.<br />- Ananda JothiAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-2085771970779369940.post-47984997997466912632011-12-12T09:32:51.227+05:302011-12-12T09:32:51.227+05:30This is really a Brilliant article. Exploring some...This is really a Brilliant article. Exploring something which nobody would have thought and it has been put in a understandable format.Madhu Sudhanhttps://www.blogger.com/profile/17880135140031645838noreply@blogger.com