Newest Post

Types of Hacking

| Sunday, 24 March 2013
Read more »

Types of Hacking

Getting into the computer system, gain be done either authorization or without authorization. Depending on the conditions they are classified in three types

1. Black Hat Hacking

A black hat hackers, also knows as a Cracker or a Black Sided Hacker. Black hat hacker uses his skills with criminal intent. Black hat hackers break into a system to destroy data, to steal data, or to use the network without authorization.
Black hat hackers do not follow any particular ethic, and break into the systems for no reason except to commit crimes of some sort. These are the hackers who are most covered in the media, are often found guilt for violating Cyber Laws. It is the actions of black hat hacker that have generated a negative image for hackers.
Examples are: Cracking bank id password for the transference of money which they don’t know, stealing data for personal use.


2. White Hat Hacking

White hat hacker uses their skills and knowledge as a way to defend someone from attackers. A white hack hacker breaks security for non-malicious reasons, for instance testing their own security system.
White hat hackers find security vulnerabilities in producing systems and applications. Usually companies heir a white hat hacker to test their security systems. So white hat hackers don’t hack for their personal gain but may be prepared to technically commit crimes during the course of their technologies exploits in order to achieve them better.


3. Gray Hat Hacking

Gray hat hackers lie in between White Hat Hacker and Black Hat Hacker. They usually don’t hack for personal gain or have malicious intentions, but may be prepared to technically commit crimes during the course of their technological exploits in order to achieve better.

Types of Hacking

Posted by : Unknown
Date :Sunday, 24 March 2013
With 0comments
Tag : , ,

Level of Hackers

|
Read more »

Level of hackers

Anyone can be a hacker, regardless of age, gender, or race. Given this, skill varies widely to one malicious hacker to the other. Some hackers barely know how to surf the internet, whereas other write software programs which are equally liked by ethical hacker. Depending on the skill set, hackers may be categorized as:

1. Scripts Kiddies
These are people, usually kids, who are being attracted by magical powers that hacking gives them. Since they know so little about computer they won’t really know who to hack themselves but instead follow pirated “scripts” generated by real hackers.
They use hacker’s codes and programs available free on Internet but they have no knowledge of what is happening behind the scene.

2. Admins
These are halfway hacker usually knows just enough to create serious problems. But they do not create their own tools to hack but they use the hacking tools made by the coder.
They know about computers and networks, and often use well-known exploits, which are developed by the expertise. They have knowledge of the hacking tools, scripts, codes whereas a Script kiddies doesn’t have any kind of information related to the tools they are using.

3. Coders
These are skilled hacking experts. These are the people who develop many of the Hacking Tools, including the scripts and the other program that the script kiddies use. These folks write malware programming such as worms and viruses.

Level of Hackers

Posted by : Unknown
Date :
With 0comments
Tag : , ,

Malware

| Saturday, 23 March 2013
Read more »


Malware

Malicious program or software that deliberately harms a computer is referred to as malware. Malware is a general term used by computer professionals to mean a variety of  forms of hostile, intrusive, or program code. The term “computer virus” is sometimes used as a catch-all phrase to include all kind of malware including true viruses.

Malware includes

. Trojans

Trojan horses are both problematic and a basic kind of malicious code designed to give hacker access to system’s files. This gives hacker a change file settings, steal file or password, damage files, or monitoring user activities through internet.





. viruses

Viruses are software programs having capability to reproducing itself and usually capable of causing great harm to files or computer program on the same computer without human assistance.

. Worms

A worm is a malicious program that originates on a single computer and searches for other computer connection through Local Area Network (LAN) or internet connection. When a worm finds another computer, it replicates itself onto that computer and continuously looks for other connected computer on which to be replicate. A worm continues to attempt to replicate itself indefinitely or until a self timings process halt the process.

. Spyware

Spyware is used to gather information such a recorded keyword (such as password), a list of website visited by the users, or application and operating system that are installed on the computer.  Spyware may also collect names, credit card numbers and other personal information.
Spyware can be installed on the computer through several convert means, including as a part of software virus or as a result of adding a new program. Note that the terms spyware, stealware, and adware are sometime used to describe the same or similar types of malicious code. It is usually placed on computer gather information about interested parties.  

Malware

Posted by : Unknown
Date :Saturday, 23 March 2013
With 0comments
Tag : , ,

Types of hacking

|
Read more »

Ethical hacking

With the growth of the internet, computer security has become a major concern for business and governments. They want to be able to take advantages of the internet for electronics commerce, advertising, information distribution and access, and other pursuits, but they are worried about the possibilities of being “hacked”. At the same time, the potential customers of these services are worried about making control of personal information that varies from credit card numbers to social security numbers and home addresses.

In their search for a way to approach the problem, organization came to realize that one of the best ways to evaluate the intruder threat to their interests would be have to have independent computer security professionals attempt to break into their computer system. This scheme is similar to having independent to break into an organization to verify its bookkeeping records. In the case of computer security, these “tiger teams” or “ethical hacker” would employ the same tools and techniques as the intruders, but they would neither damage the target systems nor steal information. Instead, they would neither damage the target systems nor steal information. Instead, they would evaluate the target systems’ security and report back to the owner with the vulnerabilities they found and instruction for how to remedy them.

 Ethical hacking is also called a white hat hacking. It is a purposefully seeking out vulnerabilities that a criminal or malicious hacker could exploit. A person who enjoys exploring the details of programmable systems and how to stretches their capabilities and one who is capable of creative overcoming or circumventing  limitation is known as Ethical Hacker.

Ethical hacker learns their skills many different ways, such as self-taught trough books, attended either in person or via the Internet (distant learning), or plain, old-fashioned trial-and-error. Many of these Ethical Hacker are reformed, to former Crackers. They learned their skills and gained their abilities the same way as the current Crackers.


Types of hacking

Posted by : Unknown
Date :
With 0comments
Tag : , ,

trojan

|
Read more »


Trojans

Trojans are malicious piece of code used to install hacking software on a target system and aid the hacker in gaining and retaining access to that system. Trojans and their counter parts are important piece of the hacker’s tool kit.

A Trojan can install a backdoor program that allows a hacker to connect to a computer without going through the normal authentication process. A Trojan is a program that performs function unwanted by the target.




Example of what Trojans allow remote user controlling the Trojan to do includes the following:

.Remove files from the infected computers
.Download files of the infected computers
.Make changes to the infected computer
.Steal files and other personal data
.Rename files
.Disable a external device such as keyboard or mouse
.Shutdown or reboot the infected computer
.Run selected application or terminate open application
.Disable virus protection or other computer security software

trojan

Posted by : Unknown
Date :
With 0comments
Tag : , ,

cyber law

| Friday, 22 March 2013
Read more »


Cyber law

Cyber law is a term used to describe the legal issue related to the use of communication technology, particularly” cyberspace”, i.e. the Internet. It is less a distinct field of law in the way of property or contract are as it is an intersection of many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction. In essence, cyber law is an attempt to apply law designed for physical world to human activity on Internet.

There is no exhaustive definition of the term “Cyber law”. Simply speaking Cyber law is a generic term which  refer to all the legal and regulatory aspect of Internet and world wide web.   

cyber law

Posted by : Unknown
Date :Friday, 22 March 2013
With 0comments
Tag : ,

Proxy servers

|
Read more »

GPass Download

GPass is a highly advanced software that can encrypt your online data, hide your IP address, and sidestep content filtering and monitoring using a number of secure channels to connect to the Internet and break through the Internet blockade. GPass supports the online applications that you use the most, including Web browsers (e.g. Firefox), multimedia players, email, instant messengers, download managers, and so on.

Hopster

Bypass Firewall - Bypass Proxy - HTTP tunnel

Chat with your friends using your favourite applications: MSN, AOL, Yahoo Messenger, ICQ, Miranda, Trillian, mIRC... Wherever your friends are, hopster will bypass a censoring firewall and take you right to your buddies.

Browse, Surf, Download & Chat Anonymously

Hide your real IP address and protect yourself from nosy people and wannabe-hackers. With hopster, there's no way anyone will know where or who you are.

M Proxy

This provides proxy solutions, with which you can access the blocked websites and protect your online privacy. You can also get free proxy lists.

Proxy I

A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.

Tor

Tor is free software and an open network that helps you defend against a form of networksurveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

Ultrasurf

Ultrasurf is a Proxy Server Software which can provide you: Privacy

Protect Internet privacy with anonymous surfing and browsing -- hide IP addresses and locations, clean browsing history, cookies & more ...

Security

Completely transparent data transfer and high level encryption of the content allow you to surf the web with high security.
Freedom

UltraSurf allows you to overcome the censorship and blockage on the Internet. You can browse any website freely, so as to obtain true information from the free world.

Your Freedom

The Your Freedom services makes accessible what is unaccessible to you, and it hides your network address from those who don't need to know. Just download our client application and install or just run it on your PC; it turns your own PC into an uncensored, anonymous web proxy and an uncensored, anonymous SOCKS proxy that your applications can use, and if that's not enough it can even get you connected to the Internet just as if you were using an unrestricted DSL or cable connection -- just like the firewall suddenly went boom! You can even make your PC accessible from the Internet if you like. Nearly all applications work with Your Freedom, and so far no-one has managed to block our service completely and permanently without blocking your Internet access entirely.

Proxy servers

Posted by : Unknown
Date :
With 0comments
Tag : ,
Prev
▲Top▲