Hacking For Beginners – Manthan Desai

2010

Directory Access controls

• Htaccess files provide a way to make configuration changes on a per-directory basis.

• Htaccess files should be used in a case where the content providers need to make configuration changes to the serveron a per-directory basis, but do not have root access on the server system.

Configuring .htacess

How Attackers Hide Them While Attacking

Proxy Servers

• A Proxy Server is a server that acts as an intermediary between a workstation user and the Internet so that theenterprise can ensure security, administrative control and caching service.

• Hackers generally use the Proxy server on the Internet to make their Identity invisible to the target.

• So They hide their IP address by using the proxy server and make an anonymous brousing over internet.

• Please See the diagram for better understanding.

www.hackingtech.co.tv

Page 62