Click here to watch video |
In this internet regime, we depend greatly on internet based services to accomplish our tasks by expending little or no time and even with the least effort possible. Just think about our dependence on internet for a second ! We use it for bank transactions, purchases and even pass our time with some social networking and other entertaining stuff. This is a very minute list of tasks that we usually carry out using internet but our original list will be very humongous. One thing we find in common in all these internet based services is the authenticating procedure that the user encounters before he/she access the actual content in the service. This is a common and necessary procedure in order to avoid the one's individual content to reach the hands of lunatics and people with bad instincts. In order to protect the confidential and personal information every internet related service, let it be a banking website or a social networking site prompts you to create a membership and login with the registered username and password every time you visit their websites. This is the only procedure we are following to protect our online data for decades. Even though many complex encryption techniques were evolved in recent past, these techniques ultimately failed to restrict the hackers from intruding into the websites of some leading services with a massive user base. Usually we come across several incidents exposing the loopholes in the leading servers through which the black hat hackers grab the access of other's bank accounts and loot their money in a flash.