HACKING MADE EASY
LEARN ETHICAL HACKING TO PREVENT BEING HACKED
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.
Hacking is most common among teenagers and young people, although there are many older hackers too. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking as an form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.
Since a large number of hackers are self-taught prodigies, but there are some organizations who actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.
Computer hackers have existed almost as long as computers. In fact, "hackers" have been in existence for more than a century. In 1878, just two years after the telephone was invented by Alexander Graham Bell, a group of teenage boys hired to run the switchboards were kicked off a telephone system in New York. The reason? The BOYS were more interested in knowing how the phone system worked than IN making proper connections and directing calls to the correct place. In essence, they were trying to "hack" the system to see how it worked.
Originally, "hacker" did not carry the negative connotations now associated with the term. In the late 1950s and early 1960s, computers were much different.
A Brief History
One might not suspect that the art, computer hacking was created at one of the havens for technological excellence. students developed the technique and borrowed their name from the "hackers" of the late 1800s who found amusement in pranking the emerging telephone companies. Getting their laughs and skills from hacking and cracking into primitive computers and exploiting the Arpanet (predecessor to the internet), they created a novelty that would become the target of federal crackdown in years to come. To define hacking in short, we can say that an artistic criminal offense of breaking into another remote system without the owner's consent for the purpose of stealing information is what is hacking.
Once this happened, breaking into the computers became a legitimate activity,
with its own groups and soon its own voice with the 2600 magazine, launched in
1984. The effects of computer hacking were serious. Two years later, inevitably,
Congress launched the Computer Fraud and Abuse Act that outlawed hacking. Over
the years, there was a series of noticeable occurrences as the worst
consequential effect of computer hacking on more high profile cases, such as the
Morris Worm, responsible for infecting government and university systems, and
the Mitnick case in 1995, which captured Kevin Mitnick, steeling as many as
20000 credit card numbers.
There are basically two types of hackers: -
1. BLACK HAT HACKER
They are also called "crackers", are hackers who specialize in unauthorized penetration. They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Such penetration often involves modification and/or destruction of data, and is done without authorization and hence they should not be confused with ethical hackers.
They also may distribute computer viruses, Internet worms, and deliver spam through the use of botnets. The term may also refer to hackers who crack software to remove protection methods: copy prevention, trial/demo version, serial number, hardware key, date checks, CD check (NO-CD) or software annoyances like nag screens and adware.
2. WHITE HAT HACKER
White hat hackers, also known as "ethical hackers," are computer security experts, who specialize in penetration testing, and other testing methodologies, to ensure that a company's information systems are secure. Such people are employed by companies where these professionals are sometimes called "sneakers." Groups of these people are often called tiger teams or red teams. These security experts may utilize a variety of methods to carry out their tests, including social engineering tactics, use of hacking tools, and attempts to evade security to gain entry into secured areas.
The National Security Agency offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team management. Aggressor teams are called "red" teams. Defender teams are called "blue" teams.
Certainly you have
many sources of information available that can give
basics. There is actually some misconception about who a real hacker is. Hacking
computers is performed by one who knows computers very well - even the extra
tricks of a computer and electronics. Any one can easily tweek these
according to his needs and become hacker. This is the way the term used when
Bill Gates was inventing Windows.
Everyone has heard of one individual or another that was caught
while hacking computers that belonged to this or that organization. Because
hacking into computers is highly illegal and punishable, it should be mentioned
that this article will not mention any real specifics about the subject, and we
would rather gladly encourage you to become a real hacker - professionally.
STEPS TO BE A HACKER
Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude.
But if you think of cultivating hacker attitudes as just a way to gain acceptance in the culture, you'll miss the point. Becoming the kind of person who believes these things is important for you - for helping you learn and keeping you motivated. As with all creative arts, the most effective way to become a master is to imitate the mind-set of masters, not just intellectually but emotionally as well.
In order to study the comparison the between the hackers and crackers, it is important to understand the respective definitions. While apparently the words hacking and cracking seems synonymous, yet there exist certain points of distinctions between the two and the meaning of the words will always be heated topics of debate. unattainable have went on opening new horizons in almost every aspects of life, and the technology is of no exception to this nature of human
AIMS OF HACKERS AND CRACKERS
The computer hackers actually trespass or circumvent artistically, yet scientifically into the other computer system with a hunger to know the programmable systems, how they perform and their internal structures, while cracking is slight different in sense. Cracking means to break off the computer's security system. This is a subject matter of hard-core science with an aesthetic undertone of artistic skill that has attracted a few millions of teenagers and young adults all over the world.
WHO IS A HACKER AND WHAT IS HIS AIM
Delving deep into the concepts, we can compare the hackers and crackers. A
hacker is a person who commits the fraudulent act or the penal offense of
exploring into the other computers in order to know the details of the
programmable system and how they work. On the other level, a cracker is a person
just more secretive as compared to the hacker. The cracker breaks through the
system's security and proves to be far more dangerous than the hackers who just
quench his or her thirst by simply discovering the workings of a system.
WHO IS A CRACKER AND WHAT IS HIS AIM?
A cracker is a technical person who has mastered the art of
breaking systems, often not for acquiring knowledge, by the dint of few programs
and softwares used as tools. They are more interested in the system's security
without the need of great deal of knowledge, thereby not benefiting much.
HACKER TRICKS AND PREVENTION TECHNIQUES
In movies or TV series where hackers are involved, we may have
seen them apply their computer knowledge in order to perform certain hacker
tricks that saved the day. Swordfish", hackers have been able to elevate
themselves to the level of heroes with only a keyboard and a mouse. However,
hackers attacks and hacker prevention is more difficulty, and complex, in real
TRICKS AND TECHNIQUES USED BY HACKERS TO ATTACK
The first most common technique used technique used by hackers is scanning. Hackers have created tools that scan computers for weak spots. It can be an operating system that hasn't been upgraded or a port in the computer that it is open without the knowledge of the user.
HOW TO PREVENT HACKER ATTACKS
Hackers are always looking for a way to get into computers of other persons. It can be something as simple as phising confidential information (like credit card or bank account numbers) to complex hacking routines that use your computer as a repository for illegal content (like music or movies with copyright).
Unfortunately there is no magical software to prevent hackers; and it will never exist. It doesn't matter how much money or resources you invest in designing the perfect system, someone will find the way to crack it. Even the biggest government agencies like NASA, CIA and NSA have been victims of hackers. And the same thing happens in the private sector with companies like Citigroup or Wal-Mart.
EFFECTIVE WAYS TO STOP HACKERS
So, what can you do to protect your tiny machine from hacker tricks? Fortunately, there are some measures that we can take, and it doesn't require us to be a Neo or Hugh Jackman's character from the movie "Swordfish". These hacker protection tips are simple and effective and will defined you from most of the attacks
The first thing to do in computer hacking prevention is to assure yourself that all your software is up to date; especially your operating system and your web browser. Why? Because they are the two things that hackers will try to attack first if they want to get into your computer.
The second thing that you need to do is to install a firewall. As a matter of fact internet firewall hacker protection has become so necessary that Microsoft now ships it for free as part of their Windows XP operating system. It took them some years to admit it, but the truth is that their software was an easy target for the hackers and crackers that lurked through the World Wide Web.
In case you don't want to use Windows XP firewall, there are many alternatives in the market. Companies like Symantec and Zone Labs have produced software firewalls for some time and have become a necessity for all the computers of corporate America. If you don't know which one you want to buy, use the trial periods. Usually you can use the firewall for 15 to 30 days; that amount of time is more than enough to make your decision. The next step in security is to have an antivirus installed. There are free versions like AVG antivirus, or pay per year licenses, like Norton Antivirus (also from Symantec). As in the case of firewalls, there are many varieties available in the market; use the trial periods for choosing wisely.
Finally, there is the anti-spyware program. As if viruses were not enough, companies from around the world decided to create programs that could pick up data from your computer in order to acquire information for their databases. It may not be as dangerous as a virus, but it is an intrusion to your privacy. Wipe them out with this piece of software.
Nowadays hacker prevention has become a task for all of us. No longer is it the responsibility of the system administrator of our company. After all, he can install all the security of the world in the company's network, but if you let a virus in because of your carelessness, he won't be able to stop it. The same goes for your computer at home. You are the only one responsible for it. Remember that new hacker tricks appear as each day goes by, so you need to be prepared.
Hacker culture is composed by all those experiences and human manifestations that are related to the exploit of hardware and software. Right now there are three kinds of hackers. The first and most known kind of hacker is the black hat hacker, or the individual who uses his knowledge for obtaining a personal benefit. Usually, it means stealing information that can be sold in the black market.
The most daring black hat hackers are able to crack bank accounts, leaving no trace behind. Fortunately, bank security and worldwide cooperation has been able to place some restrictions and control over these individuals.
On the other side of the balance is the white hack hacker, a computer security expert who works with organizations and helps them with their computer network security problems.
Finally, there are the grey hat hackers. This kind of hackers is composed by people who walk the thin line between white hat hackers and black hat hackers. Usually, their tendency will be influenced by their need of money or their lust for recognition among the hacker community.
Scorpio Net Security Services
Disclaimer : The information provided on this web pages are for educational purposes only. The author of this book or the CEO of this website is in no way responsible for any kind of damage resulted by the information given on this site or book. This does not have any hacking or cracking software on it. The soul purpose of this site and book is to make impart knowledge and make people aware of the security concern and make themselves ready towards safe computing.
HOME | ABOUT US | OUR BOOKS | HOW TO ORDER | SERVICES | HACKING OVERVIEW | HACKING TRICKS | CONTACT US
Copyright © 2012-2013. www.hackingmadeeasy.com Reproduction Strictly Prohibited. All Rights Reserved