Phishing, the name itself state’s its motivation. Let me clarify it quickly phishing strategy is usually known these days on the grounds that right now programmer makes the phoney login page which looks actually similar to a unique and when the programmer send’s that phoney page to his casualty. The casualty feels that it’s a unique page and he can log in there and when the casualty logins into that phoney page all information I mean all secret phrase’s and Gmail’s are moved to programmer’s PC, similar to this the phishing assault work’s and the phishing pages were made. 

Powered by BetterDocs

Leave a Reply

Your email address will not be published. Required fields are marked *