Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / NewStats: 3,152,451 members, 7,816,050 topics. Date: Friday, 03 May 2024 at 01:01 AM |
Nairaland Forum / Science/Technology / Webmasters / All You Need To Know About Hacking (414 Views)
Want To Learn All About Hacking, Loading And Carding? / For Those That Want To Learn Hacking / Learn Ethical Hacking Nairaland Live# (2) (3) (4)
(1) (Reply)
All You Need To Know About Hacking by tealoaded: 1:04pm On Dec 19, 2016 |
In this article, I will be explain most of the things you'll need to know to be a hacker and what's it really all about. But before I proceed, this article is for EDUCATIONAL PURPOSE ONLY, whatever you do with it after this, you are on your own. A computer is a device that can be instructed to carry out an arbitrary set of arithmetic or logical operations automatically. The Internet is run on computers and it connects millions of other computers and here is where we come. Hacking is identifying weakness or finding vulnerables in computer/smart systems networks and exploiting this found weakness to gain access to the system. The name of the people who do this is called Hackers. Types of hackers A hacker is any skilled computer expert that is capable of breaking into any computer systems and networks using bugs and exploits. Hackers are classified based on their intent. 1) White hat Hackers (Ethical Hacker) 2) Black hat Hackers (Crakers) 3) Grey hat Hackers (Ethical/Crackers) 4) Hacktivist 5) Phreakers WHEN HACKING BECOMES A CRIME:- CYBER CRIME Cybercrime is a Offence that is committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)" cc: wikipedia Common types of Cyber crimes Computer Fraud: 1)Altering in an unauthorized way 2)Altering, destroying and stealing of datas examples includes including bank fraud, carding, identity theft, extortion, and theft of classified information. Cyber terrorism: Cyberterrorism in general is an act of terrorism committed through the use of cyberspace or computer resources examples are hacking of information servers during a political election Cyberextortion: Cyberextortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers. These hackers demand money in return for promising to stop the attacks and to offer "protection". And here is where the reliever comes in; Ethical Hacking What is ethical hacking? Ethical hacking is identifying weakness in computer systems and/or computer networks and coming with counter measures that protect the weaknesses. Ethical hackers must abide by the following rules. Get written permission from the owner of the computer system and/or computer network before hacking. Protect the privacy of the organization been hacked. Transparently report all the identified weaknesses in the computer system to the organization. Inform hardware and software vendors of the identified weaknesses. Legality of ethical hacking Ethical hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time. Summary Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks. Cybercrime is committing crime with the aid of computers and information technology infrastructure. Ethical hacking is about improving the security of computer systems and/or computer networks. Ethical hacking is legal. Terminologies and Meaning Bug: A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. Most bugs arise from mistakes and errors made in either a program's source code or its design, or in components and operating systems used by such programs. Exploit: is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). read more at teazhacks..com |
(1) (Reply)
Who Has Genuine Facebook Page With Plenty Likes Or Twitter Account With Follower / Anyone Using EXOCLICK Here Let Make Deal / Getting To Admin!!!
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 11 |