HACKING The things you need to know About hacking..
  Content Description of Hacking Technique Usually Used By Hackers Steps To Avoid From Being Hacked Why Does Hacker Hacks Conclusion Resources
Description of  Hacking There are many definitions of hacking, as well as varying ideas of what a hacker is or does. Simply stated a hacker is any programming specialist who has the expertise to enter a computer or network without proper authorization.  In reference to a system’s security, hacking is usually defined as the act of illegally entering a computer system, and making unauthorized changes to the files and data contained within.
Technique Usually Used By Hackers Fake Login Page Key Logger Spy Software Key Logger Hardware Backdoor
  Fake Login Page A few computer security web pages provide what is known as the from a computer security web page and installed on the target's computer. Once the target accesses his/her email login page E.g. www.myspace.com fake login page. This software is downloaded the fake login page will show that looks exactly like the original email login page, when they type their username/password to login the password is saved permanently in a secret file on the computer. All the hacker has to do then is retrieve and view the file to see the target's password.
Key Logger Spy Software A keylogger is simply a program or a device that records everything you type on the keyboard, that includes any passwords that are typed.  There are a lot of different Spy Softwares available on the internet such as on computer security web pages and software download sites. Spy software main objective is  to collect information on the use of your computer. The software needs to be installed on the computer to be hacked and after that gives detailed reports and log files on the activity of the users such as what web pages were visited and more importantly everything they have typed. Then all that has to be done is to view the keylogger file and identify any text that appears to be the password.
  Key Logger Hardware Computer security shops sell a small device known as the keylogger, this is usually a small cylindrical device that acts as a through-port between the keyboard cable's plug and the computer's socket.  This will record all the keystrokes typed by the keyboard user and all the data is saved on the device itself. Once the device is retrieved any computer can be used to download the keystrokes and evaluate the file to find the password being used. Once again you need physical access to the computer being hacked to use this device.  The advantage is that the device cannot be detected by any software on the computer such as antivirus software and security software.
Backdoor A backdoor is simply a way back into a system that not only bypasses existing security to regain access, but may even defeat any additional security enhancements added onto a system. Backdoors can range from the simple to the exotic. Simple backdoors might include creating a new user account just for your intrusion needs, or taking over a little-used account. More complex backdoors may bypass regular access completely and involve trojans, such as a login program that gives you administrative access if you type in a special password. Backdoors can be chained together, which is the technique used by most hackers. This involves a combination of techniques. For example, one or more accounts that have basic user access may have had their passwords cracked, and one or more accounts may be created by the hacker.  Once the system is accessed by the hacker, the hacker may activate some technique or exploit a system misconfiguration that allows greater access.
Steps To Avoid From Being Hacked Always have an Anti-Spyware software,Anti-Virus and a Firewall. Only download software or files from a trusted website. Learn more about hacking so you know how to counter-measure
Why does Hacker Hacks? Job Entertainment for them The Only Thing they are specialized to do. To get classified information and gains advantage from it.
  Conclusion Hacking is a way of getting into a system without authorization done by Hackers.Hackers usually got many complicated ways hacking into a system.The reason why Hackers hack are because the job payments are high,entertainment for them and it is what they specialize in.After all,without Hackers there wil be no Hacking.
  Resources http://www.bama.ua.edu/~wilso098/project/hacking/whatishacking.html http://www.freewebtown.com/hackmail/How-to-Hack-Yahoo-and-Hotmail.htm http://www.nmrc.org/pub/faq/hackfaq/hackfaq-07.html

Aiman

  • 1.
    HACKING The thingsyou need to know About hacking..
  • 2.
    ContentDescription of Hacking Technique Usually Used By Hackers Steps To Avoid From Being Hacked Why Does Hacker Hacks Conclusion Resources
  • 3.
    Description of Hacking There are many definitions of hacking, as well as varying ideas of what a hacker is or does. Simply stated a hacker is any programming specialist who has the expertise to enter a computer or network without proper authorization. In reference to a system’s security, hacking is usually defined as the act of illegally entering a computer system, and making unauthorized changes to the files and data contained within.
  • 4.
    Technique Usually UsedBy Hackers Fake Login Page Key Logger Spy Software Key Logger Hardware Backdoor
  • 5.
    FakeLogin Page A few computer security web pages provide what is known as the from a computer security web page and installed on the target's computer. Once the target accesses his/her email login page E.g. www.myspace.com fake login page. This software is downloaded the fake login page will show that looks exactly like the original email login page, when they type their username/password to login the password is saved permanently in a secret file on the computer. All the hacker has to do then is retrieve and view the file to see the target's password.
  • 6.
    Key Logger SpySoftware A keylogger is simply a program or a device that records everything you type on the keyboard, that includes any passwords that are typed. There are a lot of different Spy Softwares available on the internet such as on computer security web pages and software download sites. Spy software main objective is to collect information on the use of your computer. The software needs to be installed on the computer to be hacked and after that gives detailed reports and log files on the activity of the users such as what web pages were visited and more importantly everything they have typed. Then all that has to be done is to view the keylogger file and identify any text that appears to be the password.
  • 7.
    KeyLogger Hardware Computer security shops sell a small device known as the keylogger, this is usually a small cylindrical device that acts as a through-port between the keyboard cable's plug and the computer's socket. This will record all the keystrokes typed by the keyboard user and all the data is saved on the device itself. Once the device is retrieved any computer can be used to download the keystrokes and evaluate the file to find the password being used. Once again you need physical access to the computer being hacked to use this device. The advantage is that the device cannot be detected by any software on the computer such as antivirus software and security software.
  • 8.
    Backdoor A backdooris simply a way back into a system that not only bypasses existing security to regain access, but may even defeat any additional security enhancements added onto a system. Backdoors can range from the simple to the exotic. Simple backdoors might include creating a new user account just for your intrusion needs, or taking over a little-used account. More complex backdoors may bypass regular access completely and involve trojans, such as a login program that gives you administrative access if you type in a special password. Backdoors can be chained together, which is the technique used by most hackers. This involves a combination of techniques. For example, one or more accounts that have basic user access may have had their passwords cracked, and one or more accounts may be created by the hacker. Once the system is accessed by the hacker, the hacker may activate some technique or exploit a system misconfiguration that allows greater access.
  • 9.
    Steps To AvoidFrom Being Hacked Always have an Anti-Spyware software,Anti-Virus and a Firewall. Only download software or files from a trusted website. Learn more about hacking so you know how to counter-measure
  • 10.
    Why does HackerHacks? Job Entertainment for them The Only Thing they are specialized to do. To get classified information and gains advantage from it.
  • 11.
    ConclusionHacking is a way of getting into a system without authorization done by Hackers.Hackers usually got many complicated ways hacking into a system.The reason why Hackers hack are because the job payments are high,entertainment for them and it is what they specialize in.After all,without Hackers there wil be no Hacking.
  • 12.
    Resourceshttp://www.bama.ua.edu/~wilso098/project/hacking/whatishacking.html http://www.freewebtown.com/hackmail/How-to-Hack-Yahoo-and-Hotmail.htm http://www.nmrc.org/pub/faq/hackfaq/hackfaq-07.html