| 
                                    
                                      |   |  
                                      |   |  
                                      |  
A TWO -DAY WORKSHOP ON ETHICAL HACKING |  
                                      |  |  
                                      | 
                                       
                                          | The CSI-Student Chapter of Dronacharya College of Engineering, Gurgaon organized a two- day workshop on “Ethical  Hacking” in association with Indian Server on 7th & 8th October 2013. The Objective of the  workshop was to discuss various concepts of Ethical Hacking and Cyber Security.  The eminent speakers of the workshop were Mr.  Sai Satish, CEO, Indian Server, Mr.  Brij Mohan, Business Development Manager, Indian Server and Mr. Himanshu Sharma, Student Vth  Semester, Department of Information Technology, DCE, Gurgaon. |  
                                         | Inaugurating  the workshop Prof. M.N. Hussain, Principal,  DCE addressed that ethical hacker helps a company or individual to identify  potential threats on the computer or network. The organization employs ethical  hacker to improve their system security, in an effort to minimize, if not  eliminate, any potential hacker attacks. |  
                                         | Prof.  Jitender Kumar, HOD, Department of Information Technology enlightened the students about the history of the hacking in ancient times. He  said that a number of companies are hiring candidates to build a team of  in-house hacking prevention security which develop software and systems that  are not prone to hacking. They can work in these companies as a Security  Analyst, Security Consultant, Tester, Security Engineer, Security Architect,  Ethical Hacker, Security Designer and IT Security Consultant etc. |  
                                         | In the  first session, Mr. Himanshu Sharma, a  student of Vth Semester, Department of Information Technology discussed  the basic concepts of Hacking.  He  explained three categories of hacker. i.e. “Black Hat”, “White Hat” and “Gray  Hat” hackers. He has received “Hall of Fame” for companies like – Google,  Microsoft, Facebook & Apple and also helped Mr. Harbhajan Singh, a  renowned Indian Cricketer to recover his  Facebook. He has also been a invited speaker at various cyber security  conferences across the nation such as Hack Anything Conference, Defcon Bangalore  Conference, Hatcon Conference.   |  
                                         | In second session, Mr. Sai Satish,  an administrator of the Andhra Hackers (Top  Hacking Awareness in India) shared his views on Security & Malware Analysis like Virus  & Ant viruses, Spyware, Adwares, Sniffers, Phishing, keyloggers,  Vulnerabity Scanners, Buffer Overflow, SQL Injection, Denial of Service, Web  Shells, Social Engineering, Trojans, XSS, Spoofing Techniques, Rootkits, Google  Hacks, Sysinternals etc  with the  participants. He discussed about the common loopholes in the websites. He had  given the live demonstration on hacking the websites. He also discussed about  the safety measures which can be taken while developing the websites so that  they cannot hacked by hacker. |  
                                         | The  hands-on sessions of the workshop were based on the real life example of  hacking. Over 350 participants from various colleges and universities  participated in the workshop. The students were provided with a  kit which includes Software CD, a book on Ethical hacking “Hacking Secrets” by the  Guest Speaker Mr. Sai Satish. |  
                                         | The  workshop concluded with a Vote of Thanks. The Guests were given memento as a  token of respect by the Head of the institution. |  
                                          |  |  |  |  |  
                                          |  |  |  |  |  
                                          |  |  |  |  |  
                                          |  |  |  |  |  
                                          |  |  |  |  |  
                                          |  |  |  |  |  
                                          |  |  |  |  |  
                                          |  |  |  |  |  |  
                          |  |  |