Types of Hacker

Let’s see the categories of Hackers on the basis on their knowledge. Coders **The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems.

Concept of Ethical Hacking

hi guys this is my first post i hope to present hacking A to Z 101 lets begun :) Hacking The Art of exploring various security breaches is termed as Hacking. # Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking

Why Hackers Hack?

The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers — they just hack to see what they can hack and what they can’t hack, usually by testing their own systems. Many Hackers are the guys who get kicked out of corporate and government IT and security organizations. They try to bring down the status of the organization by attacking or stealing information

Steps Performed By hackers

1) Reconnaissance 2) Scanning 3) Gaining Access 4) Maintaining Access 5) Clearing Tracks • Performing Reconnaissance • Scanning and Enumeration • Gaining access • Maintaining access and Placing Backdoors • Covering tracks or Clearing Log

Prevention from Hackers

What can be done to prevent Hackers from finding new holes in software and exploiting them? Information security research teams exist—to try to find these holes and notify vendors before they are exploited. There is a beneficial competition occurring between the Hackers securing systems and the Hackers breaking into those systems. This competition provides us with better and stronger security, as well as more complex and sophisticated attack techniques.

ad

Monday, July 28, 2014

Email hacking

How Email Works? 

 Email sending and receiving is controlled by the Email servers. All Email service providers configure Email Server 
before anyone can Sign into his or her account and start communicating digitally.

 Once the servers are ready to go, users from across the world register in to these Email servers and setup an 
Email account. When they have a fully working Email account, they sign into their accounts and start connecting 
to other users using the Email services.

 Email Travelling Path

 Let’s say we have two Email providers, one is Server1.com and other is Server2.in, ABC is a registered user in 
Server1.com and XYZ is a registered user in Server2.in.

 ABC signs in to his Email account in Server1.com, he then writes a mail to the xyz@server2.in and click on Send 
and gets the message that the Email is sent successfully.

 But what happens behind the curtains, the Email from the computer of abc@server1.com is forwarded to the 
Email server of Server1.com. Server1 then looks for server2.in on the internet and forwards the Email of the 
server2.in for the account of XYZ. Server2.in receives the Email from server1.com and puts it in the account of 
XYZ.
 XYZ then sits on computer and signs in to her Email account. Now she has the message in her Email inbox.