Certified Ethical Hacking Training Raipur Chhattisgarh India

Hacker's Illustration         

Embedded Robotics

Embedded Robotics for the first time in Raipur.

Read More

Ethical Hacking

Ethical Hacking for the First time in Raipur.

Read More

Java

If you wanna learn Java Professionally, and be Sun Certified, this is the place.

Read More

Microsoft .Net

Microsoft Technologies are easier to work on, tougher to learn.

Read More

A Hacker's Story

At the age of 12, he used social engineering to bypass the punchcard system used in the Los Angeles bus system. After a friendly bus driver told him where he could buy his own ticket punch, he could ride any bus in the greater LA area using unused transfer slips he found in the trash. Social engineering became his primary method of obtaining information, including user names and passwords and modem phone numbers.

In high school, he was introduced to phone phreaking, a method of manipulating telephones, which he often used to evade long-distance charges. He also became handy with amateur radios, which he allegedly used to gain unauthorized access to the speaker systems of nearby fast food restaurants.

He gained unauthorized access to his first computer network in 1979, at the age of 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied DEC's software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, he hacked into Pacific Bell voice mail computers. After a warrant was issued for his arrest, he fled, becoming a fugitive for two and a half years.

According to the U.S. Department of Justice, he gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. He also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. He was apprehended in February 1995 in North Carolina. He was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification.

HE IS KEVIN MITNICK

Come on! Make your story with us..

John T. Draper is the father of Hacking, he first in 1971 found a bug in BLUE BOX phone System.

We are conducting a WORKSHOP on various Computer Technologies like Ethical Hacking & IT Security, Embedded Robotics, Java, Microsoft .Net etc.. Come Register yourself to attend the workshop.

WORKSHOP REGISTRATION