Source: National Cyber Security – Produced By Gregory Evans Personal Notes – This scan does not have any personal notes AIHP Disclaimer: There are 5 stages to computer hacking, Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Tracks. AmIHackerProof.com handles the first 2 stages, Reconnaissance and Scanning. When you see…