hacking
#1

i want to gather information of dis topic along with some visualisations to use as slide shows..
Reply
#2
Hacking
A formal definition of hacking is :Unauthorized attempts to bypass the security mechanisms of an information system or network.Hacking is an attitude and practice surrounding the use, consumption, and
production of computer-related work.The ethos behind hacking has a long legacy, dating back at
least to the beginning of the century. In computing, a hacker is a person in one of several distinct classes like:
-People committed to circumvention of computer security.
-The hobbyist home computing community, focusing on hardware. The community included Steve Jobs(Apple CEO), Steve Wozniak(co-founder of apple) and Bill Gates(Microsoft) and created the personal computing industry.
-A community of enthusiast computer programmers and systems designers, originated in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory.

Computer security hackers
In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems.The media portrays the 'hacker' as a villain.But they have a role in correcting the security problems. With the release of the movie WarGames that year raised the public belief that computer security hackers (especially teenagers) could be a threat to national security. As a result of these laws against computer criminality, white hat, grey hat and black hat hackers try to distinguish themselves from each other, depending on the legality of their activities.

Home computer hackers
In this context, hacker refers to computer hobbyists who push the limits of their software or hardware.The areas that did not fit together with the academic hacker subculture focus mainly on commercial computer and video games, software cracking and exceptional computer programming. Some also try modding(modifying computer hardware and electronics for their benefit).
some general facts about hackers include:

1)Hacking occurs in a social context
2) Hacking is irreverent and informal, and this is in tension with the various
institutions that support hacking
3) Respect is gained through hands-on problem-solving
4) Hacking is concerned with opening black boxes and understanding their
content.
5) Hackers are mainly male

Hacker groups:These have drawn more people every year including SummerCon (Summer), DEF CON, HoHoCon (Christmas), and H.O.P.E.

Hacker attitudes:
Hackers with different attitudes and aims use different terms to differentiate themselves from each other:
1)White hat:A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system.

2)Grey hat:is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted

3)Black hat: sometimes called "cracker", is someone who breaks computer security without authorization or uses technology for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity.

4)Script kiddie:
is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others and may have only little understanding of what it actually does.

5)Hacktivist:
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message.

Common methods used by hackers
1)Security exploit:
It is a prepared application that takes advantage of a known weakness.Eg.SQL injection attacks injects malicious SQL code in maybe textboxes.

2)Password cracking

3)Vulnerability scanner:
It is a tool used to quickly check computers on a network for known weaknesses.They also use port scanners for open ports to gain access.

4)Packet sniffer:
It is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

5)Spoofing attack:It involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program.

6)Rootkit:
It is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators.

7)Trojan horse:
It is a program which seems to be doing one thing, but is actually doing another. It can open a backdoor for attacker to gain access.

8)Social engineering:
It is the art of getting persons to reveal sensitive information about a system.

9)Worm:
It is a self-replicating program that propagates through computer networks without user intervention.

10)Virus
It is a self-replicating program that spreads by inserting copies of itself into other executable code or documents.

11)Key loggers:
It is a tool designed to record ('log') every keystroke on an affected machine for later retrieval.confidential information typed on the affected machine, such as a user's password or other private data are sent to the attacker.

Full report download:
[attachment=1198]
Reply
#3
please read http://studentbank.in/report-ethical-hac...ull-report for more about ethical hacking
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: hacking farmville, hacking wireless book in hidi, what is firecell hacking, information of hacking for seminar, hacking sikhna hai online, hotmail password hacking, steve mclaren,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Big Grin south african mtn airtime cheating hacking codes 2 1,075 09-09-2016, 02:55 PM
Last Post: bradley
  bank account hacking tricks in hindi 2 1,274 21-07-2016, 12:30 PM
Last Post: visalakshik
Big Grin hacking tricks in hindi pdf 1 1,278 21-07-2016, 11:15 AM
Last Post: jaseela123d
Wink learn computer hacking in hindi language 1 672 16-06-2016, 10:56 AM
Last Post: dhanabhagya
  ethical hacking course hindi pdf 1 851 09-06-2016, 04:40 PM
Last Post: dhanabhagya
Wink computer hacking tricks in hindi pdf 1 1,110 17-05-2016, 11:54 AM
Last Post: dhanabhagya
  bank account hacking tricks in hindi 1 661 17-05-2016, 11:32 AM
Last Post: dhanabhagya
  bank account hacking tricks in hindi 1 817 13-05-2016, 10:32 AM
Last Post: dhanabhagya
Smile computer hacking marathi book download in pdf 1 667 12-05-2016, 08:12 AM
Last Post: pb
Tongue learn computer hacking in hindi language 1 747 18-04-2016, 09:09 AM
Last Post: dhanabhagya

Forum Jump: