3. Hacker:
• Hacker generally is described as the word of person who has specialist skills in
the field of computer and information security. It is launched essentially on a set
of clever programmers who defies the different systems and try to storm, but
not necessarily to commit a crime, but their success in penetration is considered
a success of their abilities and skills. And to do this optional process in which the
programmer tested his abilities without knowing his real name or declaring
himself. But some of them are exploiting for criminal sabotage to clear
information and others are exploiting commercially for the purposes of
espionage and to steal some money.
• A lot of companies like Microsoft needs to protect their systems, and it found
that the best method is to set high salaries for hackers whose mission is to
attempt to penetrate the various systems and find places weaknesses, and
suggest ways for prevention from damage caused by computer hackers. In this
case hacker image began to gain a lot of positives.
4.
5. Cracker:
• Cracker term was later to distinguish between good hacker and
spoiler hacker. Despite both have the intelligence and spirit of
challenge and lack of fear of facing the unknown, but the cracker
always acts in sabotage and intrusion for reasons are not positive; and
this person is the one who deserves naming computer pirate. While
the hacker devises solutions to the problems and , he is trying to
innovate in his work.
• But the ways of the media speak generally "hacker”, and confused the
reformer and the spoiler, and the passage of time, the hacker name
has been associated with the spoiler person.
7. Information gathering methods:
• Eavesdropping: sensor and take data from the network through the sniffer
programs that record everything that goes on between the computers.
• Social Engineering : is method to impersonating character style that serves
a hacker to obtain required information where the hacker persuades the
person that he is his friend, or one of the persons who have entitled to
access to information.
• Wireless networks: the search process spatially on the presence of wireless
networks and usually hacker wanders between regions searching for Wi-Fi
networks or hotspots where they exploit a common data between users of
these networks and gaps in the connected devices to the network , that
will enable the hacker to penetrate.
8. How hacker penetrates sites:
• This is done through two phases:1) the collection of information; the
most important information are the target network address and
knowing the operating system on that goals and scripts System to
examine them if it had gaps software and these gaps allow a hacker
does several things forbidden. 2)The attack phase; it is exploiting the
gaps . These hackers enter the control panel, apply commands on the
server or raising malicious files.