LEARN ABOUT HAKING

General Discussions
Post Reply
User avatar
Face
Major
Major
Posts: 727
Joined: Thu Feb 18, 2010 5:06 pm
Location: SRI LANKA.KANDY.

LEARN ABOUT HAKING

Post by Face » Sun Mar 14, 2010 3:50 pm

I think that some knowledge abut hacking is really interesting..

Not for ILLEGAL use.

when we use internet I believe that we should have some knowledge about that to protect our details and safety and some ideas.

specially we use facebook and in that site there are many hackers.

I also experienced one.struck in my account and some bad works done by those hackers using my account..

It is better to know about safety.........

If we know basics in that we have idea how to protect ourselves.
User avatar
Face
Major
Major
Posts: 727
Joined: Thu Feb 18, 2010 5:06 pm
Location: SRI LANKA.KANDY.

Re: LEARN ABOUT HAKING

Post by Face » Sun Mar 14, 2010 4:03 pm

For Hacking which refers to breaching computer security

Hacking (English verb to hack, singular noun a hack) refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer. The term(s) have several related meanings in the technology and computer science fields, wherein a "hack" may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem (see also "kludge").

The terms "hack" and "hacking" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime; there being a distinction between security breaking and hacking, a better term for security breaking would be "cracking".

Hacker (computer security)

In common usage, a hacker is a person who breaks into computers, usually by gaining access to administrative controls. The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, and are often unconcerned about the use of illegal means to achieve them.

Other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), but these are rarely used by the mainstream media. Some would argue that the people that are now considered hackers are not hackers, as before the media described the person who breaks into computers as a hacker there was a hacker community. This community was a community of people who had a large interest in computer programming, often sharing, without restrictions, the source code for the software they wrote. These people now refer to the cyber-criminal hackers as "crackers".

Notable Security Hackers

Kevin Mitnick

Kevin Mitnick is a computer security consultant and author, formerly the most wanted computer criminal in United States history.

Eric Corley

Eric Corley (also known as Emmanuel Goldstein) is the long standing publisher of 2600: The Hacker Quarterly. He is also the founder of the H.O.P.E. conferences. He has been part of the hacker community since the late '70s.

Fyodor

Gordon Lyon, known by the handle Fyodor, authored the Nmap Security Scanner as well as many network security books and web sites. He is a founding member of the Honeynet Project and Vice President of Computer Professionals for Social Responsibility.

Solar Designer

Solar Designer is the pseudonym of the founder of the Openwall Project.

Gary McKinnon

Gary McKinnon is a British hacker facing extradition to the United States to face charges of perpetrating what has been described as the "biggest military computer hack of all time"

Hackers in fiction

Books portraying hackers:

* The cyberpunk novels of William Gibson — especially the Sprawl Trilogy — are very popular with hackers.
* Hackers (short stories)
* Snow Crash
* Helba from the .hack manga and anime series.
* Little Brother by Cory Doctorow
* Rice Tea by Julien McArdle
* Lisbeth Salander in Men who hate women by Stieg Larsson

Films

* Cypher
* Tron
* WarGames
* The Matrix series
* Hackers
* Swordfish
* The Net
* The Net 2.0
* Antitrust
* Enemy of the State
* Sneakers
* Untraceable
* Firewall
* Die Hard "4": Live Free or Die Hard
* Eagle Eye
* Take Down
* Weird Science


Non-fiction books

* Hacking: The Art of Exploitation, Second Edition by Jon Erickson
* The Hacker Crackdown

* The Art of Intrusion by Kevin D. Mitnick
* The Art of Deception by Kevin D. Mitnick
* Takedown
* The Hacker's Handbook
* The Cuckoo's Egg by Clifford Stoll

[edit] Fiction books

* Ender's Game
* Neuromancer
* Evil Genius
User avatar
Neo
Site Admin
Site Admin
Posts: 2642
Joined: Wed Jul 15, 2009 2:07 am
Location: Colombo

Re: LEARN ABOUT HAKING

Post by Neo » Mon Mar 15, 2010 12:48 am

Nice topic. Lets try to explain other possibilities of avoidance of hacking in future topics.
User avatar
Face
Major
Major
Posts: 727
Joined: Thu Feb 18, 2010 5:06 pm
Location: SRI LANKA.KANDY.

Re: LEARN ABOUT HAKING

Post by Face » Mon Mar 15, 2010 6:15 pm

all of us it is very hard to get knowledge about hacking.....

soo join us this is the best HOBBY you can have..
live with technology...it is interesting..
Post Reply

Return to “General Discussions”