Main Article Content
Hacking is the most genius field of computing science which is getting bigger with the passage of time. This research paper has the methods and techniques of hacking, types of hacking, types of hackers, types of hacking attacks, common tools of hacking, the geography of hackers, phases of hacking, protection processes, past reports, instruments of hacking and at last the future discussion on this field. This paper is enough to get to know some beginning information of hacking.
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
University of Sindh Journal of Information and Communication Technology (USJICT) follows an Open Access Policy under Attribution-NonCommercial CC-BY-NC license. Researchers can copy and redistribute the material in any medium or format, for any purpose. Authors can self-archive publisher's version of the accepted article in digital repositories and archives.
Upon acceptance, the author must transfer the copyright of this manuscript to the Journal for publication on paper, on data storage media and online with distribution rights to USJICT, University of sindh, Jamshoro, Pakistan. Kindly download the copyright for below and attach as a supplimentry file during article submission