Any security evaluation involves three components:

* Preparation: In this phase, a formal contract is signed between an ethical hacker and the authority of the organization that contains a non-disclosure clause as well as a legal clause to protect the ethical hacker against any prosecution that he may face during the conduct phase. The contract also outlines the infrastructure perimeter, evaluation activities, time schedules, and resources available to him.
* Conduct: In this phase, the evaluation technical report is prepared based on testing potential vulnerabilities.
* Conclusion: In this phase, the results of the evaluation are communicated to the organization and corrective advice/action, if needed, is taken.

Explore More

Critical XSS Vulnerability in The New Era Journal http://www.khitpyaing.org

PlanetCreator.Net’s Security Team Member has reported another critical XSS vulnerability on http://www.khitpyaing.org These are some information from Vulneral Site http://www.khitpyaing.org: This vulnerability has been alerted to webmaster: [email protected] Vulnerability Link

XP Registry tricks II

Easy Text Size Change in Help & IE Tip:I mentioned a way that you can change the size of the text that is display in the Help file and in

Hacker Motivation: I Think Therefore I Hack

Hackers’ motivations vary. For some, it’s economic. They earn a living through cyber crime. Some have a political or social agenda—their aim is to vandalize high-profile computers to make a