Hacking Websense

Now,we are ready to hack the websense.This will allow you to access the web even the websense is working in the network.You need to do the following steps.....

1)Install the mozilla web browser.
2)Go to 'Tools' tab.


Credit Card And Internet

Credit Card,Internet And Hacking

In the previous article we came to know about the internet and the transaction security.In this article we will see the security of credit card payment through the internet.

Encrypted credit-card numbers aren't valuable enough by themselves, however, to pay for the compute time spent to attack them. A few years ago someone attempted to sell a large collection of valid credit-card numbers to an undercover FBI agent, who bought them for the modest sum of $2.50 per number. That price hardly justifies the effort needed to decrypt

read more

Are Web Transactions Safe?

Are Web Transactions Safe?

In this cyber world,we do all the business,transaction like bill payment of the mobile,money transfer from one account to other and so many other works.But the question is that how safe is this transaction process.

Now-a-days anyone can buy a pair of small electronic devices that encrypt data sent between two computers across telephone lines. However, Computer A can only understand data sent by Computer B if both of these special devices share the same key. The first device uses the key to encrypt the data using the shared, secret key, while the second device uses that same key to decrypt the information, making it readable to the recipient.
Now comes an interesting question: When your browser encrypts and decrypts data that it shares with a Web site,




We have discussed what is websense in the earlier post,in this post we will see the working of the websense.Websense Enterprise works in conjunction with a Master Database of 2.2 million Web sites (comprising 400 million pages) that fall into one of 65+ categories. The user can configure Websense to monitor or block sites in each category. In Websense Enterprise 4.2, administrators can allow users to continue surfing or defer access to sites in a particular category until after work.Sites are first mined through proprietary software techniques and then classified into categories. Sites not categorized by this method are evaluated by qualified Internet analysts for proper categorization and continually checked for accuracy.
Websense uses the IP screening technology so that if any one try to access the web directly,it will be filtered using this technology.Websense do this by
pre-converts all domain names in the database into IP addresses.So it also eliminates the possibility of someone accessing a site directly via the IP address and bypassing the Websense database.

Security Audit Log Is Full

Security Audit Log Is Full

The Event Log folder that contains this policy is available only in Group Policy objects associated with domains, OUs, and sites. The Event Log folder does not appear in the Local Computer Policy object.So we get this error message while login.To avoid this problem do following steps:

Audit Policy

To enable auditing of security related events:


Open the applicable Security Policy.


Expand Security Settings.


Within Security Settings, expand Local Policies to reveal the Audit, User Rights Assignment, and Security Options policies.


Click on the Audit Policy object. The right-hand details pane will reveal the configurable Audit Policy settings



Websense is a internet access management system that allows an organization to monitor, report and manage internal Internet use and to prevent misuse of internet from the organization.
Websense is a San Diego-based company specializing in Web security gateway software. This enables client businesses and governments to block user access to chosen categories of website. company says it is the global leader in its field. It has come under criticism from civil liberties groups on the grounds that it assists repressive régimes to restrict freedom of speech.


Evaluation Methods for Internet Security Technology (EMIST)

The main objective of the NSF/DHS-sponsored EMIST (Evaluation Methods for Internet Security Technology) research initiative is to develop scientifically rigorous testing frameworks and methodologies for evaluating approaches to large-scale network defenses. Their goal has been to expand the rigor with which we model the protection claims of malware defense algorithms, particularly as we design the metrics that will be used to evaluate and compare competing malware approaches. To this end, we consider how to more rigorously express defense specifications, formally validate or refute desired properties of these systems, and employ simulation and emulation experiments to fully stress algorithm performance. So,this technology is going to be one of the strong soluton for security.