Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Post: #1

i want to gather information of dis topic along with some visualisations to use as slide shows..
Post: #2
A formal definition of hacking is :Unauthorized attempts to bypass the security mechanisms of an information system or network.Hacking is an attitude and practice surrounding the use, consumption, and
production of computer-related work.The ethos behind hacking has a long legacy, dating back at
least to the beginning of the century. In computing, a hacker is a person in one of several distinct classes like:
-People committed to circumvention of computer security.
-The hobbyist home computing community, focusing on hardware. The community included Steve Jobs(Apple CEO), Steve Wozniak(co-founder of apple) and Bill Gates(Microsoft) and created the personal computing industry.
-A community of enthusiast computer programmers and systems designers, originated in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory.

Computer security hackers
In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems.The media portrays the 'hacker' as a villain.But they have a role in correcting the security problems. With the release of the movie WarGames that year raised the public belief that computer security hackers (especially teenagers) could be a threat to national security. As a result of these laws against computer criminality, white hat, grey hat and black hat hackers try to distinguish themselves from each other, depending on the legality of their activities.

Home computer hackers
In this context, hacker refers to computer hobbyists who push the limits of their software or hardware.The areas that did not fit together with the academic hacker subculture focus mainly on commercial computer and video games, software cracking and exceptional computer programming. Some also try modding(modifying computer hardware and electronics for their benefit).
some general facts about hackers include:

1)Hacking occurs in a social context
2) Hacking is irreverent and informal, and this is in tension with the various
institutions that support hacking
3) Respect is gained through hands-on problem-solving
4) Hacking is concerned with opening black boxes and understanding their
5) Hackers are mainly male

Hacker groups:These have drawn more people every year including SummerCon (Summer), DEF CON, HoHoCon (Christmas), and H.O.P.E.

Hacker attitudes:
Hackers with different attitudes and aims use different terms to differentiate themselves from each other:
1)White hat:A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system.

2)Grey hat:is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted

3)Black hat: sometimes called "cracker", is someone who breaks computer security without authorization or uses technology for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity.

4)Script kiddie:
is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others and may have only little understanding of what it actually does.

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message.

Common methods used by hackers
1)Security exploit:
It is a prepared application that takes advantage of a known weakness.Eg.SQL injection attacks injects malicious SQL code in maybe textboxes.

2)Password cracking

3)Vulnerability scanner:
It is a tool used to quickly check computers on a network for known weaknesses.They also use port scanners for open ports to gain access.

4)Packet sniffer:
It is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

5)Spoofing attack:It involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program.

It is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators.

7)Trojan horse:
It is a program which seems to be doing one thing, but is actually doing another. It can open a backdoor for attacker to gain access.

8)Social engineering:
It is the art of getting persons to reveal sensitive information about a system.

It is a self-replicating program that propagates through computer networks without user intervention.

It is a self-replicating program that spreads by inserting copies of itself into other executable code or documents.

11)Key loggers:
It is a tool designed to record ('log') every keystroke on an affected machine for later retrieval.confidential information typed on the affected machine, such as a user's password or other private data are sent to the attacker.

Full report download:
Post: #3
please read for more about ethical hacking

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: celc hacking codes, hotmail password hacking**n foot step power generating system, what is firecell hacking, evercookie hacking technique, wireless hacking, ethikal hacking doc, hacking for dummies,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
Big Grin south african mtn airtime cheating hacking codes Guest 2 296 09-09-2016 02:55 PM
Last Post: bradley
  bank account hacking tricks in hindi Guest 2 549 21-07-2016 12:30 PM
Last Post: visalakshik
Big Grin hacking tricks in hindi pdf Guest 1 370 21-07-2016 11:15 AM
Last Post: jaseela123
Wink learn computer hacking in hindi language Guest 1 149 16-06-2016 10:56 AM
Last Post: dhanyavp
  ethical hacking course hindi pdf Guest 1 231 09-06-2016 04:40 PM
Last Post: dhanyavp
Wink computer hacking tricks in hindi pdf Guest 1 421 17-05-2016 11:54 AM
Last Post: dhanyavp
  bank account hacking tricks in hindi Guest 1 207 17-05-2016 11:32 AM
Last Post: dhanyavp
  bank account hacking tricks in hindi Guest 1 288 13-05-2016 10:32 AM
Last Post: dhanyavp
Smile computer hacking marathi book download in pdf Guest 1 163 12-05-2016 08:12 AM
Last Post: pb
Tongue learn computer hacking in hindi language Guest 1 206 18-04-2016 09:09 AM
Last Post: dhanyavp