BRIEF
INTRODUCTION TO HACKING
-VISHWAS AITHAL
The Internet was born in 1969. Almost
immediately after the network was established, researchers were confronted with
a disturbing fact: The Internet was not secure and could easily be cracked.
Today, writers try to minimize this fact, reminding you that the security
technologies of the time were primitive. This has little bearing. Today,
security technology is quite complex and the Internet is still easily cracked.
We work in the dark
We do what we can
We give what we have
Our doubt is our passion, and our passion is our task
The rest is the madness of art.
-- Henry James
We do what we can
We give what we have
Our doubt is our passion, and our passion is our task
The rest is the madness of art.
-- Henry James
-
A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Most often, hackers are programmers. As such, hackers obtain advanced knowledge of operating systems and programming languages. They may know of holes within systems and the reasons for such holes. Hackers constantly seek further knowledge, freely share what they have discovered, and never ever intentionally damage data.
-
A cracker is a person who breaks into or otherwise violates the system integrity of remote machines, with malicious intent. Crackers, having gained unauthorized access, destroy vital data, deny legitimate users service, or basically cause problems for their targets. Crackers can easily be identified because their actions are malicious.
Please go through
The Jargon File - a great
source of trivia, lore, and translations for difficult concepts. The Jargon File
contains a bunch of definitions of the term ‘hacker’, most having to do with
technical adeptness and a delight in solving problems and overcoming limits.
The Hacker Attitude
- The world is full of fascinating problems waiting to be solved.
- No problem should ever have to be solved twice.
- Boredom and drudgery are evil.
- Freedom is good.
- Attitude is no substitute for competence.
- Learn how to program.
- Get one of the open-source UNIX and learn to use and run it.
- Learn how to use the World Wide Web and write HTML.
- If you don't have functional English, learn it.
-
SCANNER: A Scanner is a program that automatically detects security weaknesses in a remote or local host.
-
PASSWORD CRACKER: A Password Cracker is any program that can decrypt passwords or otherwise disable password protection. Sometimes a dictionary attack is performed.
-
TROJAN HORSE: A Trojan Horse an unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user.
-
SNIFFER: A Sniffer is any device, whether software or hardware, that grabs information traveling along a network. That network could be running any protocol: Ethernet, TCP/IP, IPX, or others (or any combination of these). The purpose of the sniffer is to place the network interface into promiscuous mode and by doing so, to capture all network traffic.
AND U CAN KEEP IN TOUCH WITH OUR BLOG ANYTIME N EVERYTIME N EVERYWHERE TOOO....
SO DOWNLOAD THE APP N COMMENT UR VIEWS N IF U LIKE THE APP SHARE IT COZ THIS IS MY FIRST ANDROID APP SO NEED FEW FEED BACKS ON MY APPP
THANK U N FEEL FREE TO SHARE AND COMMENT
LINK TO DOWNLOAD : CLICK HERE TO DOWNLOAD THE APP
0 comments:
Post a Comment