hacking By: Maria Ulfah Binti Mokhtar Ahmad Class: 4 Sc Erat/07 Teacher: Cik. Azlina
A person who learns about the computer systems in details.
The person wrote program referred to as hacks. Hacker may use modem cable to hack the targeted computers.
a source of threat to security in computer.
Defined as unauthorized access to the computer system by a hacker .
16 easy steps to hack:-
Get a real SL/IP account. If you want to hack the internet, you will need to be directly connected to the net, and SL/IP basically does this
Most of the net runs on UNIX like operating systems. So, you have to do the same. Buy a UNIX type operating system, and several books on UNIX. The easiest (and cheapest) way to go is with one of the multi-cd Linux sets. The best is to get the Slackware release on CD.
Re-partition your hard drive about 340 megs, so you will have room for a Linux partition.
Read all the installation instructions for Linux.
Install Linux on your system. Follow the instructions you read in step 5. Install everything, especially the net stuff, the programming stuff, and the docs, etc. Once you have everything installed, reboot and log in.
Read the kernel docs/FAQ/How-To. Now recompile your kernel to make a custom kernel for your system.
Got your new kernel compiled? Install it, and re-run. Re-boot with your custom kernel.
Now that you are running a real OS, read all the docs, etc.
Next play with your nice new OS. Spend a little time exploring and learning the system. After playing with the system for about a year, go on (if you were never on AOL etc, then you probably don't need the full year, maybe only about a month).
Configure your system for SL/IP and accessing the net. When you installed Linux in the first place, you ran the net configuration script, but that didn't set up everything. You have some text files to edit, and you need to set up DIP if you are going to be accessing the net via modem.
Learn to use the basic net tools. Get use to it.
Learn to program. Get some books on stuff like C, etc. Play with Perl, C, C++ on your system until you can actually program. Now practice programming for a while until you get at least a little good at it.
Read all the RFCs. These contain information that is vital if you want to hack the net.
Subscribe to a few security related mailing lists and newsgroups.
You should now have enough information to try some simple hacks, so try some simple hacks. If they work, great, you are almost a junior hacker.
Explore the net. Try things. Look for security holes. Read a lot of source code. Write some hacking utilities.
Status in the Hacker Culture :
Write open-source software.
Publish useful information.
Help test and debug open-source software.
Help keep the infrastructure working.
Serve the hacker culture itself.
The Hacker Attitude :
Freedom is good.
The world is full of fascinating problems waiting to be solved.
No problem should ever have to be solved twice.
Boredom and drudgery are evil.
Attitude is no substitute for competence.
The 3 Biggest Hacker :
This 41-year-old Scotsman, also known as Solo, is the perpetrator of what’s considered the biggest hack in the history of computer science - into a military system. Not satisfied with this, in the years 2001 and 2002, he made a mockery of the information security of NASA itself and the Pentagon. Currently he is at liberty awarding his extradition to the U.S. and prohibited access to a computer with Internet connection.
This Russian biochemist and mathematician was accused of having committed one of the biggest bank robberies of all times by means of the cracking technique. From Saint Petersburg, Levin managed to transfer funds estimated at approximately 10 million dollars from Citibank in New York to accounts he had opened in distant parts of the world. He was arrested by INTERPOL in 1995 at Heathrow airport (England). Although he managed to rob more than 10 million dollars, he was only sentenced to three years in prison. Currently he is free.
Known worldwide as the “most famous hacker” and for having been the first to serve a prison sentence for infiltrating computer systems. He started dabbling when he was a minor, using the practice known as phone breaking. Although he has never worked in programming, Mitnick is totally convinced that you can cause severe damage with a telephone and some calls. These days, totally distanced from his old hobbies and after passing many years behind bars, he works as a security consultant for multinational companies through his company “Mitnick Security.”