I think that some knowledge abut hacking is really interesting..
Not for ILLEGAL use.
when we use internet I believe that we should have some knowledge about that to protect our details and safety and some ideas.
specially we use facebook and in that site there are many hackers.
I also experienced one.struck in my account and some bad works done by those hackers using my account..
It is better to know about safety.........
If we know basics in that we have idea how to protect ourselves.
LEARN ABOUT HAKING
Re: LEARN ABOUT HAKING
For Hacking which refers to breaching computer security
Hacking (English verb to hack, singular noun a hack) refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer. The term(s) have several related meanings in the technology and computer science fields, wherein a "hack" may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem (see also "kludge").
The terms "hack" and "hacking" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime; there being a distinction between security breaking and hacking, a better term for security breaking would be "cracking".
Hacker (computer security)
In common usage, a hacker is a person who breaks into computers, usually by gaining access to administrative controls. The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, and are often unconcerned about the use of illegal means to achieve them.
Other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), but these are rarely used by the mainstream media. Some would argue that the people that are now considered hackers are not hackers, as before the media described the person who breaks into computers as a hacker there was a hacker community. This community was a community of people who had a large interest in computer programming, often sharing, without restrictions, the source code for the software they wrote. These people now refer to the cyber-criminal hackers as "crackers".
Notable Security Hackers
Kevin Mitnick
Kevin Mitnick is a computer security consultant and author, formerly the most wanted computer criminal in United States history.
Eric Corley
Eric Corley (also known as Emmanuel Goldstein) is the long standing publisher of 2600: The Hacker Quarterly. He is also the founder of the H.O.P.E. conferences. He has been part of the hacker community since the late '70s.
Fyodor
Gordon Lyon, known by the handle Fyodor, authored the Nmap Security Scanner as well as many network security books and web sites. He is a founding member of the Honeynet Project and Vice President of Computer Professionals for Social Responsibility.
Solar Designer
Solar Designer is the pseudonym of the founder of the Openwall Project.
Gary McKinnon
Gary McKinnon is a British hacker facing extradition to the United States to face charges of perpetrating what has been described as the "biggest military computer hack of all time"
Hackers in fiction
Books portraying hackers:
* The cyberpunk novels of William Gibson — especially the Sprawl Trilogy — are very popular with hackers.
* Hackers (short stories)
* Snow Crash
* Helba from the .hack manga and anime series.
* Little Brother by Cory Doctorow
* Rice Tea by Julien McArdle
* Lisbeth Salander in Men who hate women by Stieg Larsson
Films
* Cypher
* Tron
* WarGames
* The Matrix series
* Hackers
* Swordfish
* The Net
* The Net 2.0
* Antitrust
* Enemy of the State
* Sneakers
* Untraceable
* Firewall
* Die Hard "4": Live Free or Die Hard
* Eagle Eye
* Take Down
* Weird Science
Non-fiction books
* Hacking: The Art of Exploitation, Second Edition by Jon Erickson
* The Hacker Crackdown
* The Art of Intrusion by Kevin D. Mitnick
* The Art of Deception by Kevin D. Mitnick
* Takedown
* The Hacker's Handbook
* The Cuckoo's Egg by Clifford Stoll
[edit] Fiction books
* Ender's Game
* Neuromancer
* Evil Genius
Hacking (English verb to hack, singular noun a hack) refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer. The term(s) have several related meanings in the technology and computer science fields, wherein a "hack" may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem (see also "kludge").
The terms "hack" and "hacking" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime; there being a distinction between security breaking and hacking, a better term for security breaking would be "cracking".
Hacker (computer security)
In common usage, a hacker is a person who breaks into computers, usually by gaining access to administrative controls. The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, and are often unconcerned about the use of illegal means to achieve them.
Other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), but these are rarely used by the mainstream media. Some would argue that the people that are now considered hackers are not hackers, as before the media described the person who breaks into computers as a hacker there was a hacker community. This community was a community of people who had a large interest in computer programming, often sharing, without restrictions, the source code for the software they wrote. These people now refer to the cyber-criminal hackers as "crackers".
Notable Security Hackers
Kevin Mitnick
Kevin Mitnick is a computer security consultant and author, formerly the most wanted computer criminal in United States history.
Eric Corley
Eric Corley (also known as Emmanuel Goldstein) is the long standing publisher of 2600: The Hacker Quarterly. He is also the founder of the H.O.P.E. conferences. He has been part of the hacker community since the late '70s.
Fyodor
Gordon Lyon, known by the handle Fyodor, authored the Nmap Security Scanner as well as many network security books and web sites. He is a founding member of the Honeynet Project and Vice President of Computer Professionals for Social Responsibility.
Solar Designer
Solar Designer is the pseudonym of the founder of the Openwall Project.
Gary McKinnon
Gary McKinnon is a British hacker facing extradition to the United States to face charges of perpetrating what has been described as the "biggest military computer hack of all time"
Hackers in fiction
Books portraying hackers:
* The cyberpunk novels of William Gibson — especially the Sprawl Trilogy — are very popular with hackers.
* Hackers (short stories)
* Snow Crash
* Helba from the .hack manga and anime series.
* Little Brother by Cory Doctorow
* Rice Tea by Julien McArdle
* Lisbeth Salander in Men who hate women by Stieg Larsson
Films
* Cypher
* Tron
* WarGames
* The Matrix series
* Hackers
* Swordfish
* The Net
* The Net 2.0
* Antitrust
* Enemy of the State
* Sneakers
* Untraceable
* Firewall
* Die Hard "4": Live Free or Die Hard
* Eagle Eye
* Take Down
* Weird Science
Non-fiction books
* Hacking: The Art of Exploitation, Second Edition by Jon Erickson
* The Hacker Crackdown
* The Art of Intrusion by Kevin D. Mitnick
* The Art of Deception by Kevin D. Mitnick
* Takedown
* The Hacker's Handbook
* The Cuckoo's Egg by Clifford Stoll
[edit] Fiction books
* Ender's Game
* Neuromancer
* Evil Genius
Re: LEARN ABOUT HAKING
Nice topic. Lets try to explain other possibilities of avoidance of hacking in future topics.
Re: LEARN ABOUT HAKING
all of us it is very hard to get knowledge about hacking.....
soo join us this is the best HOBBY you can have..
live with technology...it is interesting..
soo join us this is the best HOBBY you can have..
live with technology...it is interesting..