|
|
|||||||
| Computers & Information Technologies « Everything related to computers and internet. » |
![]() |
|
|
Share | Thread Tools | Search this Thread |
|
|
#2 |
|
Beyond the Code
Last Online: 06-15-2014
Join Date: Sep 2008
Posts: 2,993
Thanks: 2,214
Thanked 3,426 Times in 1,499 Posts
Groans: 57
Groaned at 69 Times in 52 Posts
|
انقلب السحر على الساحر
|
|
|
|
| The Following 2 Users Say Thank You to Neoxter For This Useful Post: | cybermax (06-09-2009), SysTaMatIcS (06-09-2009) |
|
|
#3 | |
|
Registered Member
Last Online: 11-09-2012
Join Date: Feb 2009
Posts: 91
Thanks: 12
Thanked 22 Times in 20 Posts
Groans: 0
Groaned at 4 Times in 3 Posts
|
Quote:
![]() -computer science or computer engineering (just curious) |
|
|
|
|
|
|
#4 |
|
Last Online: 05-30-2013
Join Date: Jan 2008
Posts: 1,788
Thanks: 10,018
Thanked 1,100 Times in 651 Posts
Groans: 1
Groaned at 6 Times in 6 Posts
|
|
|
|
|
|
|
#5 |
|
Registered Member
Last Online: 11-09-2012
Join Date: Feb 2009
Posts: 91
Thanks: 12
Thanked 22 Times in 20 Posts
Groans: 0
Groaned at 4 Times in 3 Posts
|
|
|
|
|
|
|
#6 | |
|
Last Online: 05-30-2013
Join Date: Jan 2008
Posts: 1,788
Thanks: 10,018
Thanked 1,100 Times in 651 Posts
Groans: 1
Groaned at 6 Times in 6 Posts
|
Quote:
A hacker has to know how to program. But a professional programmer is not necessarily a hacker. A hacker has to know about computer security. Offensive security, defensive security and all. A hacker has his own ways of thinking and analyzing. Unlike the others, a hacker does not just look at "the even", he looks at "the odd". He may use the art of deception or social engineering skills to break into a given system or network. He's born "hacker-like". For example, if you have a light in a room. How can you turn it off? - Press the switch button? - Shoot the light with a gun? - Turn off the whole house electricity? - Shutdown the electricity industry? - Cut the wiring cable? - Hire someone to do it himself? - Just cover the light with something making it unseen? A hacker always find ways to break in. No system is safe. There are some companies that teach you some hacking basic skills and you get a certificate. For example, the CEH (Certified Ethical Hacker). The are also other computer security certificates that teach you how to audit a given computer system or network, and how to manage a penetration testing. Noting that a penetration testing is done by human and not by tools, because tools (vulnerability scanners) always give false positives and never reveal the whole threats and bugs in a given system. Not, anyone having the CEH can call himself a hacker. A perfect 1337 hacker might not have any of these certificates mentioned above. Hacking skills are promoted by experience. You hack to learn and not learn to hack. You seek for computer knowledge and discover many systems and information. Hackers are self-taught, they seek for computer knowledge. They never stop learning. Hackers have their own philosophies. Some of them are aiming to fight the big companies who are dominating the world with their techniologies. Some of them are fighting for the right of expression (anonymously). Some of them are fighting for the sake of open source. Some of them hack for money, either to live or just because they are greedy and thiefs. Some of them hack because they are terrorsits. Some of them just hack for knowledge and fun. It depends... Hackers are classified between three categories: - White hats - Gray hats - Black hats White hats are those know people in the seciruty industry. Those who are hired by companies to audit and do penetration testing to enhance security. This type of hackers don't abuse the internet. Gray hat hackers might abuse at a certain moment, having their own reasons for this (it might be religious, patriotic, personal...). They are just like the white hat ones exept that they can be dangerous and abusive at a certain level. Black hat hackers are the most dangerous hackers. They destroy everything in front of them. They are born to abuse. As soon as they get the chance to destroy a certain system, they won't say no! Most of these are terrorists. They mass deface websites and doesn't care about anything. I can keep writing, but I think that's enough. I hope I clarified the idea a little bit. If there is any question, feel free to ask. |
|
|
|
|
| The Following 4 Users Say Thank You to Google For This Useful Post: |
|
|
#7 |
|
Registered Member
Last Online: 11-09-2012
Join Date: Feb 2009
Posts: 91
Thanks: 12
Thanked 22 Times in 20 Posts
Groans: 0
Groaned at 4 Times in 3 Posts
|
this much for now ... thx XD
|
|
|
|
|
|
#8 |
|
Beyond the Code
Last Online: 06-15-2014
Join Date: Sep 2008
Posts: 2,993
Thanks: 2,214
Thanked 3,426 Times in 1,499 Posts
Groans: 57
Groaned at 69 Times in 52 Posts
|
-when and what and how did u start hacking?
-what is the color of your hat :P? |
|
|
|
|
|
#9 |
|
Last Online: 05-30-2013
Join Date: Jan 2008
Posts: 1,788
Thanks: 10,018
Thanked 1,100 Times in 651 Posts
Groans: 1
Groaned at 6 Times in 6 Posts
|
|
|
|
|
|
|
#10 |
|
Last Online: 05-30-2013
Join Date: Jan 2008
Posts: 1,788
Thanks: 10,018
Thanked 1,100 Times in 651 Posts
Groans: 1
Groaned at 6 Times in 6 Posts
|
I have put that in the Vista password bypass thread and I'll put it here:
Website staff needed. Anyone interested in computer security and thinks that he/she is good enough at this domain, contact me on this email: sosoblood@hotmail.com |
|
|
|
![]() |
|
| Tags |
| astalavista, exposed |
| Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
|
|