Types of Hacker

Let’s see the categories of Hackers on the basis on their knowledge. Coders **The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems.

Concept of Ethical Hacking

hi guys this is my first post i hope to present hacking A to Z 101 lets begun :) Hacking The Art of exploring various security breaches is termed as Hacking. # Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking

Why Hackers Hack?

The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers — they just hack to see what they can hack and what they can’t hack, usually by testing their own systems. Many Hackers are the guys who get kicked out of corporate and government IT and security organizations. They try to bring down the status of the organization by attacking or stealing information

Steps Performed By hackers

1) Reconnaissance 2) Scanning 3) Gaining Access 4) Maintaining Access 5) Clearing Tracks • Performing Reconnaissance • Scanning and Enumeration • Gaining access • Maintaining access and Placing Backdoors • Covering tracks or Clearing Log

Prevention from Hackers

What can be done to prevent Hackers from finding new holes in software and exploiting them? Information security research teams exist—to try to find these holes and notify vendors before they are exploited. There is a beneficial competition occurring between the Hackers securing systems and the Hackers breaking into those systems. This competition provides us with better and stronger security, as well as more complex and sophisticated attack techniques.

ad

Wednesday, August 29, 2012

Email Service Protocols

  SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP is used when Email is delivered from an Email client, such as Outlook Express, to an Email server or when Email is delivered from one Email server to another. SMTP uses port 25.  POP3POP3 stands for Post Office Protocol. POP3 allows an Email client to download an Email from an Email server. The POP3 protocol is simple and does not offer many features except for download....

How to grab IP address with PHP

How to grab IP address with PHP Today I’ll be showing you how to grab somebodies IP address when they visit a page. The variable to use is $_SERVER['REMOTE_ADDR'] - It’s that simple. You can use it for just about anything, here are a few examples. Printing the Users IP Address: <?php print ($_SERVER['REMOTE_ADDR'], "I'm Watching You!"); ?> Printing it to a File: <?php $ip = $_SERVER['REMOTE_ADDR']; $handle = fopen('ipaddresses.txt'',...

Wednesday, August 8, 2012

Working of an ethical hacker

  Obeying the Ethical Hacking Commandments: Every Ethical Hacker must follow few basic principles. If he do not follow, bad things can happen. Most of the time  these principles get ignored or forgotten when planning or executing ethical hacking tests. The results are even  very dangerous. Working ethically: The word ethical can be defined as working with high professional morals and principles. Whether...

Sunday, August 5, 2012

Prevention from Hackers

  What can be done to prevent Hackers from finding new holes in software and exploiting them? Information security research teams exist—to try to find these holes and notify vendors before they are exploited. There is a beneficial competition occurring between the Hackers securing systems and the Hackers breaking into those systems. This competition provides us with better and stronger security, as well as more complex and sophisticated...

Why Hackers Hack?

The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers — they just hack to see what they can hack and what they can’t hack, usually by testing their own systems. Many Hackers are the guys who get kicked out of corporate and government IT and security organizations. They try to bring down the status of the organization by attacking or stealing information. The knowledge that malicious...

Saturday, August 4, 2012

Types of Hacker

  Let’s see the categories of Hackers on the basis on their knowledge. Coders **The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems. **  Coders are the programmers who have the ability to find...

Concept of Ethical Hacking

hi guys this is my first post  i hope to present hacking A to Z 101 lets begun :)  Hacking The Art of exploring various security breaches is termed as Hacking.  # Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We  have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known. #  In a world of Black and White, it’s easy...