Pretexting:Pretexting is the act of been that u r not torelease information (e.g. date of birth, Social SecurityNumber, last bill amt.)Phishing:Phishing is an e-mail fraud method in which theperpetrator sends out email in an attempt to gatherpersonal and financial information from recipients.Phishers attempt to fraudulently acquiresensitive information, such as usernames, passwords andcredit card details .Ebay and PayPal are two of the mosttargeted companies, and online banks are also commontargets
Language of hackers - Leet1 -> i or l3 -> e4 -> a7 -> t9 -> g0 -> o$ -> s| -> i or l|| -> n|/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x
Example:1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1swh3|| 1 h4ck3d 1nI did not hack this page, it was like thiswhen I hacked in.
World famous hackers StephenWozniac TsutomuShimomura
Preventive measures Install a strong anti-virus with fullsecurity from internet, removalmemory etc. Avoid disclosing personal details likephone number, credit card details tostrangers. A good firewall (Sygate personal) A good spy ware / Trojan buster. Use of genuine software
How to become Hacker The best approach is to gain as muchknowledge about stuff as you can. Good command over C / C++ / Perlwill definitely help. But above all you need a good logicalbrain
Some Examples of CrackingWindows Cracking1) Windows Logonpassword Breaking
Window log on passwordbreaking To hack windows login password, reboot and wait for the message:When we see the boot menu on the screen, press F2 or F12 before “StartingWindows 9x…” . The boot menu will come up. Select option to boot into DOS.C:>cd windows C:windows>ren *.pwl *.xyz // RENAMEOr delete them by typing C:windows>del *.pwl *.xyz//DELETE
Easy and Simple approachOn many computers a series ofkeystrokes may crash the password program.keep pressing ESC 15 to 20 times . This willresult in the crashing of the password program and thecomputer will continue booting .BY BOOTINGWe can break into a computer by using live tools likeconboot live cd which are readly available on internet .Thelive cd can be used to make a bootable pen drive and thenwe can break into any computer.