PDA

View Full Version : Info on hacking!



xZ.xOolzx
04-30-2012, 11:03 AM
WORD HACKING

”Hacking” is the word that shakes everyone whenever it is said or heard by someone. Everyone born in this world with attitude wants to be a Hacker. But it is not a job of a new born baby or an old grown lady. A Hacker needs a brilliant mind to hack anything. His skills should be so powerful that no other hacker can hack him. A Hacker doesn’t need a software to hack. There are many rules that he should learn to become an Ethical Hacker. These rules include knowledge of HTML, JavaScripts, Computer Tricks, Cracking & Breaking etc.etc. So, don’t fool around anyone saying that “I am a Hacker!”.


And Remember —> Hacking Is Not A Crime!





HISTORY OF HACKERS

Kevin Mitnick, often incorrectly called by many God of hackers, broke into the computer systems of the World’s top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Micro systems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.
November 2002
Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a fast-track extradition to the US where he is a Wanted man. The next hearing in the case is slated for today.




TYPES OF HACKERS!


White Hat Hacker
Also referred as Ethical Hacker or sometimes called as Sneakers. A White Hat Hacker mainly focuses on securing corporate Network from outsider threat.
They are with good intention who fight against Black Hat.

Grey Hat Hacker
They are Skilled Hacker who sometimes act legally and sometime not. In simple word you may call a Grey Hat hacker as Hybrid between White Hat and Black Hat hacker.

Black Hat Hacker

Also referred as Cracker. A Black Hat Hacker’s intention is to break into others Network, and wish to secure his own machine. They often uses different techniques for breaking into systems which can involve advanced programming skills and social engineering.