Security

This page will concentrate basically on security/hacking.

Hacking is a five step process
  1. Reconnaissance
  2. Scanning
  3. Enumeration
  4. attack
  5. Covering tracks