Friday, April 29, 2011

Computer Hacking and Cracking basics introduction


Computer Hacking and Cracking basics


Nuts and Bolts
To know what is computer hacking, one must know their terms. A list of certain significant ones is described below.
Hacking run
essentially, a hacking run is a hacking session that lasts longer than normal working times, i.e. a hacking run that lasts for in excess of eight to ten hours.
White Hat
considered one of nice guys, a white hat hacker is one who hacks and the informs the owner of the hacking
Black Hat
in contrast, the black hat hacker is considered a criminal and uses his/her skills to break the law

Gray Hat
as one would imagine, a gray hat hacker sometimes is good, and sometimes is criminal; a combination of the white and black hat
Script Kiddie
a demeaning term, used for those who hack but do so by following directions and not creating anything of their own
Trojan horse
deceptive programs that pretend they do one thing, only to enter the computer system and do another; however, they need not be bad for the computer
Virus
a self-replicating program that inserts itself into executable codes or documents
Worm
also a self-replicating program, but a worm breeds itself in computer systems.
Software, Hardware, and Internet Hacking
Although the computer languages should solely be used for the legitimate purposes such as learning and other constructive purposes, yet there are lots of ways these languages are used as the means of destructions. The languages such as C, C++, java, Pearl and few more like these are used for hacking. Hackers are the programming experts who have sound grips in the language mentioned above. The language C is the utmost flexible and is the widely accepted one as the ported language in the community of the hackers.


Linux is the strongest hacker-friendly operating system that can be used by the hackers intending to hack another system. The hackers use wide range software to break into the remote systems. Although these programs and software were constructed for some legal purposes, yet they have turned to be the serious hacker tools. A few worth mentioning software and programs are DeCSS 1.2b, Coldlife 4.0, PCHelps Network Tracer, IntelliTamper 2.07 and etc.

1 comment:

timmorison said...

It's good to know about the introduction. It will increase my knowledge. I think these are the intro about some viruses.

computer hacking forensic investigator

Comments

blog comments powered by Disqus