Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
199. Hackers prospectivs
Post: #1

199. Hackers prospectivs
is the topic selected & am intrested in preseting it in college
Post: #2
A hacker can have different meanings
Hacker (computing), a contentious term used for several types of person:
Hacker (computer security) or cracker, who accesses a computer system by circumventing its security system
Hacker (programmer subculture), who shares an anti-authoritarian approach to software development now associated with the free software movement
Hacker (hobbyist), who makes innovative customizations or combinations of retail electronic and computer equipment

Hackers prospective in the web domain
Hackers target the web application because it easily provides access to the most valuable business assets, such as employee and customer data (like health records and credit card information) as well as corporate proprietary information. While most web sites are heavily secured at the network level with firewalls and encryption tools, these sites still allow hackers complete access to the enterprise through web application manipulation.
Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what computers could do and created ways to achieve that potential.

A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug -- a section of bad code that prevented the program from working properly -- hackers would often create and distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they'd happily do for free.

As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning -- a person using computers to explore a network to which he or she didn't belong. Usually hackers didn't have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.
more on this here:

Ethical hacking
Individuals with unethical behaviors are
finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages.

Hackers techniques
The major attack techniques of hackers are:
1.Buffer overflows: overwriting a crafted buffer over the return address of a function.
this can be: Overflowing A Stack Buffer
Off-By-One Overflows
2.Heap Overflows
3.Function Pointers
4.Format String Attacks which belong to the third generation techniques.
more on hackers techniques here:

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: hackers are people too, hackers gd topic, hackers password, matka hackers tricks, hackers code, hackers chat, seminar topics in providing security in passwords from hackers,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  uml diagram for screenshot hackers Guest 1 111 16-03-2016 02:21 PM
Last Post: dhanyavp
  HACKERS marshallbeckham 1 632 13-02-2012 02:52 PM
Last Post: seminar paper
  hackers NAVNEET 1 708 11-02-2010 11:23 AM
Last Post: seminarbuddy
  HACKERS Sri 1 789 05-12-2009 02:45 PM
Last Post: ajukrishnan