Professional Documents
Culture Documents
Hackfest Workshop: Short Listing Criteria
Hackfest Workshop: Short Listing Criteria
Due to limitations on the number of people we can offer place at Techfest workshops, we
follow a scrutinizing process. The participants will have to fill in the following questionnaire
based on which short listing shall be done.
Instructions
Note that the following instructions have to be strictly adhered to and failing to do so
will lead to disqualification of the concerned entry.
,Viruses are the computer world's great boogerbears. Most computer problems
blamed on "some damn virus" are actually caused by something else. So scananning
is the process to detect viruses to avoid the dataloss and other damages.
(i) Nmap
It is a security scanner. It is used to create a map of computer and discover hosts and
services on a computer network.
(ii) Nullscan
Null scan is just a little piece in os-fingerprinting. As the name "null" scan already
implies, no flags are set on packages. This is a method to trick firewall-filters.
Microsoft OS do not apply to standards in this point (as e.g. also for UDP), so this
method remains without effect on them.
(iii) Firewalk
Trojan is malware that appears to perform a desirable function for the user prior to
run or install but instead facilitates unauthorized access of the user's computer
system. "It is a harmful piece of software that looks legitimate. Users are typically
tricked into loading and executing it on their systems", as Cisco describes.
SMS forging is a relatively new kind of high-tech felony, which uses the short
message service (SMS), which is available on most mobile phones and personal
digital assistants, to spoof or impersonate another user. The spoofing is often used to
send viruses that can be carried from phone to phone and which can cause
destructive behaviour.
SQL stands for Structured Query Language. It lets you access and manipulate
databases. It is an ANSI (American National Standards Institute) standard. It is a
database computer language designed for managing data in relational database
management systems (RDBMS), and originally based upon relational algebra. Its
scope includes data insert, query, update and delete, schema creation and
modification, and data access control.
Q.9 Why do you want to attend this workshop? (Statement of purpose, SOP)
Q.10 Where and how do you intend to use the knowledge gained at this workshop?