SlideShare una empresa de Scribd logo
1 de 31
Awareness against Hacking
Author’s Name: Dipnarayan Das
Author’s Email: dipnarayan.das35@gmail.com
How to create Virtual Lab
Virtual Box
VirtualBox is a powerful x86 and
AMD64/Intel64 virtualization product
for enterprise as well as home use.
It is freely available as Open Source
Software under the terms of the
GNU General Public License (GPL).
Contd…
Version:
New April 17th, 2018
VirtualBox 5.1.36 released!
New October 18th, 2017
VirtualBox 5.2 released!
Contd…
Platforms:
Presently, VirtualBox runs on
Windows, Linux, Macintosh, and
Solaris hosts and supports a large
number of guest operating systems
including but not limited to Windows
(NT 4.0, 2000, XP, Server 2003,
Vista, Windows 7, Windows 8,
Windows 10), DOS/Windows 3.x,
Linux (2.4, 2.6, 3.x and 4.x), Solaris
and OpenSolaris, OS/2, and
OpenBSD.
Hacking OS
Kali Linux
Kali Linux is the new generation of
the industry-leading BackTrack Linux
penetration testing and security
auditing Linux distribution. Kali
Linux is a complete re-build of
BackTrack from the ground up,
adhering completely to Debian
development standards.
Parrot Universe
Parrot is a GNU/Linux distribution
based on Debian Testing and
designed with Security,
Development and Privacy in mind.
It includes a full portable laboratory
for security and digital forensics
experts, but it also includes all you
need to develop your own software
or protect your privacy while surfing
the net.
Pics of Hacking OS
Fig 1. Kali Linux Customized Fig 2. Kali Linux Standard
Fig 3. Parrot Menu Options Fig 4. Parrot Editor Panel
What is Cryptography
Cryptography
Cryptography is associated with the
process of converting ordinary plain
text into unintelligible text and vice-
versa. It is a method of storing and
transmitting data in a particular
form so that only those for whom it
is intended can read and process it.
Cryptography not only protects data
from theft or alteration, but can also
be used for user authentication.
Caesar cipher
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
The action of a Caesar cipher is to
replace each plaintext letter with a
different one a fixed number of
places down the alphabet. The
cipher illustrated here uses a left
shift of three, so that (for example)
each occurrence of E in the
plaintext becomes B in the cipher
text.
Continue…
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
Decryption
shift
Candidate plaintext
0 exxegoexsrgi
1 dwwdfndwrqfh
2 cvvcemcvqpeg
3 buubdlbupodf
4 attackatonce
5 zsszbjzsnmbd
6 yrryaiyrmlac
...
23 haahjrhavujl
24 gzzgiqgzutik
25 fyyfhpfytshj
Caesar Encryption &
Decryption
c2d = dict(zip("abcdefghijklmnopqrstuvwxyz",range(26)))
d2c = dict(zip(range(26),"abcdefghijklmnopqrstuvwxyz"))
for i in range(26):
key_c = i
ciphertext =
"wshpualeapzhalytbzlkpujyfwavnyhwofaohaylmlyzavhtlzzhnlilmvyllujyfwapvuvyhmalykljyfwapvuhukpzhtlzzhnl
puhmvytaohapzlhzpsfylhkhislifobthuz"
# encipher
plaintext = ""
for c in ciphertext:
if c: plaintext += d2c[ (c2d[c] + key_c)%26 ]
else: plaintext += c
print(plaintext)
print("n")
'''
Answer:
Key is 19
Text is "PLAIN TEXT IS A TERM USED IN CRYPTOGRAPHY THAT REFERS TO A MESSAGE BEFORE ENCRYPTION OR
AFTER DECRYPTION AND IS A MESSAGE IN A FORM THAT IS EASILY READABLE BY HUMANS"
'''
Hacking Tools
Hacking Tools
Trojan Horse is a method that enables the cracker to set up a way to intrude on a
computer or a system, by having his/her code installed with useful software on the
machine, network, or system. The cracker can enter the system through that back door
later on. Examples of this useful software are programs that mimic login screens,
viruses that fool the user to download programs, and other applications.
Snooper is an application that enables the cracker to capture secure information while it
is in transit within a computer or a network. For example, information transported
between web pages for form applications transitions and stages, and the transportation
of information from a form to the server.
A worm is an application that looks for weaknesses in a system or a network, and
reproduces itself on that system till the system crashes. A virus on the other hand, is
attached to software, and is spread once the software is executed. The danger of a
virus can be as harmless as a sound, or a picture, or as harmful as a worm, that
changes the binary setting of the computer, and crashes the system. Further light will
be shed on how each of viruses and worms act when accessing a system.
Vulnerability Scanner is a tool that is used to check if a computer on a network has a
known weakness. There are also port scanners that enable the cracker to determine the
open port that can be accessed through to the computer.
Packet Sniffing can be used for network monitoring, and for troubleshooting. It can be a
powerful tool to gather information that helps compromise the network.
Hacking Thwarting
Hacking Thwarting
Some of the methods and
techniques that are used to reduce
the effects of hackers and malicious
software are developed by different
companies. Companies vary in their
ideas of what is the weakest point in
a network that should be protected
from hackers. Each software tool
has its negatives and positives, and
below, is a discussion of some of the
tools that are used to lessen the
intrusion of a hacker or virus to a
network system.
IDS (Intrusion Detection
System)
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
Performance Analysis
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
Computer Performance
Analysis
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
Website Spam Detection
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
Example of Infection
Program
Overview of Xblades.exe
What Is Xblades.exe?
Xblades.exe is a type of EXE file associated with X-
Blades developed by Gaijin Entertainment for the
Windows Operating System. The latest known version
of Xblades.exe is 1.0.0.0, which was produced for
Windows XP. This EXE file carries a popularity rating of
1 stars and a security rating of "UNKNOWN".
What Are EXE Files?
EXE ("executable") files, such as xblades.exe, are files
that contain step-by-step instructions that a
computer follows to carry out a function. When
you "double-click" an EXE file, your computer
automatically executes these instructions designed by a
software developer (eg. Gaijin Entertainment) to run a
program (eg. X-Blades) on your PC.
Every software application on your PC uses an
executable file - your web browser, word processor,
spreadsheet program, etc. - making it one of the most
useful kinds of files in the Windows operating system.
Without executable files like xblades.exe, you wouldn't
be able to use any programs on your PC.
Example Attack
Target Convolution
Change target at attack scene
Continue…
User attacked the Target
Continue…
You are the target victim
Thank you
For any query or any report, viewer can contact with my email.

Más contenido relacionado

Similar a Awareness against hacking

Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
Bikramjit Sarkar, Ph.D.
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
Joshua Thijssen
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
Google
 
The Ultimate IDS Smackdown
The Ultimate IDS SmackdownThe Ultimate IDS Smackdown
The Ultimate IDS Smackdown
Mario Heiderich
 
The Hidden XSS - Attacking the Desktop & Mobile Platforms
The Hidden XSS - Attacking the Desktop & Mobile PlatformsThe Hidden XSS - Attacking the Desktop & Mobile Platforms
The Hidden XSS - Attacking the Desktop & Mobile Platforms
kosborn
 

Similar a Awareness against hacking (20)

Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
COMP416-Risk-and-threats_127798.pptx
COMP416-Risk-and-threats_127798.pptxCOMP416-Risk-and-threats_127798.pptx
COMP416-Risk-and-threats_127798.pptx
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
 
Hacking
HackingHacking
Hacking
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03
 
Encrypted message transmitter on public network
Encrypted message transmitter on public networkEncrypted message transmitter on public network
Encrypted message transmitter on public network
 
Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Criptography
CriptographyCriptography
Criptography
 
Cns 1
Cns 1Cns 1
Cns 1
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
The Ultimate IDS Smackdown
The Ultimate IDS SmackdownThe Ultimate IDS Smackdown
The Ultimate IDS Smackdown
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
The Hidden XSS - Attacking the Desktop & Mobile Platforms
The Hidden XSS - Attacking the Desktop & Mobile PlatformsThe Hidden XSS - Attacking the Desktop & Mobile Platforms
The Hidden XSS - Attacking the Desktop & Mobile Platforms
 
Cryptography and .NET
Cryptography and .NETCryptography and .NET
Cryptography and .NET
 
Ransomware for fun and non-profit
Ransomware for fun and non-profitRansomware for fun and non-profit
Ransomware for fun and non-profit
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Encryption-Decryption Challenge: Caesar Cipher - About me!
Encryption-Decryption Challenge: Caesar Cipher - About me!Encryption-Decryption Challenge: Caesar Cipher - About me!
Encryption-Decryption Challenge: Caesar Cipher - About me!
 

Último

Último (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Awareness against hacking

  • 1. Awareness against Hacking Author’s Name: Dipnarayan Das Author’s Email: dipnarayan.das35@gmail.com
  • 2. How to create Virtual Lab
  • 3. Virtual Box VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is freely available as Open Source Software under the terms of the GNU General Public License (GPL).
  • 4. Contd… Version: New April 17th, 2018 VirtualBox 5.1.36 released! New October 18th, 2017 VirtualBox 5.2 released!
  • 5. Contd… Platforms: Presently, VirtualBox runs on Windows, Linux, Macintosh, and Solaris hosts and supports a large number of guest operating systems including but not limited to Windows (NT 4.0, 2000, XP, Server 2003, Vista, Windows 7, Windows 8, Windows 10), DOS/Windows 3.x, Linux (2.4, 2.6, 3.x and 4.x), Solaris and OpenSolaris, OS/2, and OpenBSD.
  • 7. Kali Linux Kali Linux is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. Kali Linux is a complete re-build of BackTrack from the ground up, adhering completely to Debian development standards.
  • 8. Parrot Universe Parrot is a GNU/Linux distribution based on Debian Testing and designed with Security, Development and Privacy in mind. It includes a full portable laboratory for security and digital forensics experts, but it also includes all you need to develop your own software or protect your privacy while surfing the net.
  • 10. Fig 1. Kali Linux Customized Fig 2. Kali Linux Standard
  • 11. Fig 3. Parrot Menu Options Fig 4. Parrot Editor Panel
  • 13. Cryptography Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice- versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.
  • 14. Caesar cipher In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence. The action of a Caesar cipher is to replace each plaintext letter with a different one a fixed number of places down the alphabet. The cipher illustrated here uses a left shift of three, so that (for example) each occurrence of E in the plaintext becomes B in the cipher text.
  • 15. Continue… In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence. Decryption shift Candidate plaintext 0 exxegoexsrgi 1 dwwdfndwrqfh 2 cvvcemcvqpeg 3 buubdlbupodf 4 attackatonce 5 zsszbjzsnmbd 6 yrryaiyrmlac ... 23 haahjrhavujl 24 gzzgiqgzutik 25 fyyfhpfytshj
  • 16. Caesar Encryption & Decryption c2d = dict(zip("abcdefghijklmnopqrstuvwxyz",range(26))) d2c = dict(zip(range(26),"abcdefghijklmnopqrstuvwxyz")) for i in range(26): key_c = i ciphertext = "wshpualeapzhalytbzlkpujyfwavnyhwofaohaylmlyzavhtlzzhnlilmvyllujyfwapvuvyhmalykljyfwapvuhukpzhtlzzhnl puhmvytaohapzlhzpsfylhkhislifobthuz" # encipher plaintext = "" for c in ciphertext: if c: plaintext += d2c[ (c2d[c] + key_c)%26 ] else: plaintext += c print(plaintext) print("n") ''' Answer: Key is 19 Text is "PLAIN TEXT IS A TERM USED IN CRYPTOGRAPHY THAT REFERS TO A MESSAGE BEFORE ENCRYPTION OR AFTER DECRYPTION AND IS A MESSAGE IN A FORM THAT IS EASILY READABLE BY HUMANS" '''
  • 18. Hacking Tools Trojan Horse is a method that enables the cracker to set up a way to intrude on a computer or a system, by having his/her code installed with useful software on the machine, network, or system. The cracker can enter the system through that back door later on. Examples of this useful software are programs that mimic login screens, viruses that fool the user to download programs, and other applications. Snooper is an application that enables the cracker to capture secure information while it is in transit within a computer or a network. For example, information transported between web pages for form applications transitions and stages, and the transportation of information from a form to the server. A worm is an application that looks for weaknesses in a system or a network, and reproduces itself on that system till the system crashes. A virus on the other hand, is attached to software, and is spread once the software is executed. The danger of a virus can be as harmless as a sound, or a picture, or as harmful as a worm, that changes the binary setting of the computer, and crashes the system. Further light will be shed on how each of viruses and worms act when accessing a system. Vulnerability Scanner is a tool that is used to check if a computer on a network has a known weakness. There are also port scanners that enable the cracker to determine the open port that can be accessed through to the computer. Packet Sniffing can be used for network monitoring, and for troubleshooting. It can be a powerful tool to gather information that helps compromise the network.
  • 20. Hacking Thwarting Some of the methods and techniques that are used to reduce the effects of hackers and malicious software are developed by different companies. Companies vary in their ideas of what is the weakest point in a network that should be protected from hackers. Each software tool has its negatives and positives, and below, is a discussion of some of the tools that are used to lessen the intrusion of a hacker or virus to a network system.
  • 21. IDS (Intrusion Detection System) In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.
  • 22. Performance Analysis In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.
  • 23. Computer Performance Analysis In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.
  • 24. Website Spam Detection In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.
  • 26. Overview of Xblades.exe What Is Xblades.exe? Xblades.exe is a type of EXE file associated with X- Blades developed by Gaijin Entertainment for the Windows Operating System. The latest known version of Xblades.exe is 1.0.0.0, which was produced for Windows XP. This EXE file carries a popularity rating of 1 stars and a security rating of "UNKNOWN". What Are EXE Files? EXE ("executable") files, such as xblades.exe, are files that contain step-by-step instructions that a computer follows to carry out a function. When you "double-click" an EXE file, your computer automatically executes these instructions designed by a software developer (eg. Gaijin Entertainment) to run a program (eg. X-Blades) on your PC. Every software application on your PC uses an executable file - your web browser, word processor, spreadsheet program, etc. - making it one of the most useful kinds of files in the Windows operating system. Without executable files like xblades.exe, you wouldn't be able to use any programs on your PC.
  • 30. Continue… You are the target victim
  • 31. Thank you For any query or any report, viewer can contact with my email.