Sunday 28 July 2013

Am I Hacker Proof Security App For Android

Am I Hacker Proof Security App For Android. It's scans your network, computer or website from the outside as a hacker would, looking for vulnerabilities. Once it finds the vulnerabilities, it will email or text you
 letting you know how many vulnerabilities you have. In addition, in the paid version you can check to see if your voicemail on your cell phone is hacker proof.

This App does not use any resources on your phone. Once you start a scan you will be
notified via email or text your scan started. When your scan is completed you will be notified again that your scan is complete.

1. Reconnaissance (research) - Gathering information about the target. Just like a professional team who watches the video tapes of their opponents before game time, looking for the weakness and strength of their opponents, so does a hacker looking for the strengths and weaknesses in your network or website.

2. Scanning /Vulnerability check –
This is what performs. scans website, computer or network just like a hacker would. Below is a list of scanning phases and checks performs.

3. Gaining Access –
this is the penetration or hacking phase. Using the information found in #2 Scanning/Vulnerability check.

4. Maintaining Access –
Once a hacker gains access, he wants to keep access. He does this by setting up backdoors, adding phantom accounts or even installing spyware.

5. Cover Tracks –
What makes a “Great” thief is being able to sneak in and get out without leaving any trace. A “Great” hacker compared to an “ok” hacker can get in and out without leaving a trace.

Am I Hacker Proof includes these services for free:
- Choose from three types of scans: A “Quick” scan (up to four hours), a “Complete” scan
 (can take up to four days to complete), and a Web site scan (searches for vulnerabilities in certain types of Web sites; currently supports WordPress Web sites).

- You can perform a scan on any Web or IP address.

- You can scan up to 10 times a month.

- Built- in tools – Ping, Traceroute, Whois, ISP/E-mail Service Providers database and real
 time cyber security news feeds.
- Your reports are saved in a PDF file that you can read on your device or forward to any email address you like.

- Your account on your device works on the website so you can have access to more applications.

-> Voicemail Hacking.

- Built-in tools – Ping, Traceroute, Whois, ISP/E-mail Service Providers database and real time cyber security news feeds.

- Search through the scans you performed by address, time, number of vulnerabilities, or status.

- You get an email and text message letting you know the number of vulnerabilities found on that IP address or website.



Post a Comment

Note: only a member of this blog may post a comment.

Toggle Footer