This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Hacking

Hacking can be used with respect to a computer system as its use without a specific constructive purpose and without proper authorization. Hacking is more mastery over technology.

Hacking would include knowledge over a variety of subjects. In Hacking the telephone it could mastery over the various modes of communication which would relate to the subject of electronics. It would mean mastery over the principle of electricity to be able to tap the telephone and know how electricity can help in its working. It would also means having knowledge of switching systems and Internet Protocol wherein some telephonic communications take place.

For a computer with a variety of software and hardware it essentially would mean getting complete or in-depth knowledge of the any particular aspect that could help you go beyond the capabilities of what the software or hardware was intended. This manipulation of technology to take it beyond its inherent capacity is what hacking is all about. This can happen in a public kiosk where the security restriction of the software is by passed so that a web site or some computer may be accessed. It can also happen from a corporate or home environment. There are some who do it just for the heck of it. There are others who make money out of hacking. Therefore the various distinctions among hacking is white hat hacking, Black hat hacking and grey hat hacking. Blue hat hacking is the recent addition to paid security analysts and consultant finding loop holes in a program.

Hackers Bible

Hacker's Bible refers to a wide range of books on how to learn the working of any particular system. It gives information on how to disassemble the system, tweak the various parts and fine tune the working and reassemble the system back.

Some of the famous hacker's bibles are scanner hacker's bible, cellular hackers Bible, cable hacker's bible, CGI hacking bible, etc�The hackers Bible is essentially a guide getting you through the various processes. Its possible source is the Hacker Quarterly which focuses on different aspects of technology. The bible talks about how to augment the capacities of any electronic apparatus.

Another possible source of the hackers Bible is the Jargon file. The Jargon file is a complete glossary of hacker slang that has been collected from the old days of Arpanet. Thee hacker slang is provided so that those who search for hacking terms can do so discretely with the general public being ignorant of what is actually going on.

Hacker

Hacker is now used in a broader range which initially meant a person who had mastery over computers. Now you find ATM hackers, Game equipment hackers, Mobile hackers and so on.

In most connotations it means some one who can analytically take apart any system understand its working and put it back again. Hackers initially were terms used for computer Geeks at MIT where they would use the programming and show case their knowledge by exploits.

The Mass media now uses the term hacker very synonymously with criminals who uses programming and mastery over aspects of the computer system and usually has illegal means and ends to do the task.

To differentiate the mass media used term and the original term a new plethora of definitions have emerged. These are white hat hacker, grey hat hacker, blue hat hacker, black hat hacker, cracker, script kiddie, Google hacker and so on.

White hat hacker is a person who hacks for altruistic reasons, Black hat hacker does it for dubious reasons and the Grey hat hacker is in between with an ambiguous set of ethics.

Blue Hat is hackers that are referred when a testing is done on particular software before it is launched. These are security experts or consulting firms looking for exploits in the software so that it can be closed before the launch.

Google Hacking

Google Hacking is usually referred to as the art of using of Google search to get information from computers that are not secure. This is usually used to detect websites for vulnerabilities and various exploits. These vulnerabilities and exploits are then used to get private sensitive information like credit card numbers, social security numbers and passwords.

Google hacking is usually done using advance search operators provided by Google so that you could get sensitive data. Though the advance search can be carried out on Yahoo and MSN or any other search engine for that matter it has been named Google hacking as it was first shown that it could be done using Google.

The process involves searching for specific strings of text like "passwords" or filenames of the various files where the passwords are stored. The publicity of Google hacking is due to the wide number of presentations and instructional guide provided by Johnny Long and the others that have proved the various methods Google can be used to hack websites and networks. By using the File type advance search operator some hackers have been able to get the document files from the defense and space establishment of the United States.

Game Hacking Tools

There are many games some of these are played online and in real time. The levels of difficulty and skill in most games are meant to provide the player a thrill. But then some players always get stuck at a particular level and are not able to pass that layer.

Game hacking tools are various methods to cheat a software game so that the difficult layer is by passed. It is also used to enhance scores, proved more life, or even provide additional facilities or features offered during the playing process illegally.

Game hacking tools are usually software programs provided on a number of gaming sites with instruction on how to run the programs and where to place the code in the existing gaming program. Game hacking tools are not only available for computer based gaming systems but even for stand alone video console gaming like the XBOX, PSP and even Nitendo.

These games hacking tools are also known as game cheats and are available for a wide variety of games. The game hacking tools are usually created through the process of reverse engineering or through the use of hex editors to find the various parts of the code and tweaking them so that the purpose of Hacking the game is accomplished.

Firewall

Firewall is a means of preventing intruders onto a computer or into a network. It is a primary method to block traffic into and out of a computer system or private network. Firewalls on a personal computer are known as personal firewalls while those protecting the private network from intrusions from the internet are known as internet firewalls.

A firewall can be a combination of hardware and software. It can also be software only. When installed on a private network it is usually done on the router. A router may be a hardware device which has some intrusion detection and prevention software installed on it. It can also be software run on a computer that acts as the Private Network's gateway to the internet.

Windows firewall keeps a check on spy ware activities on your Personal Computer. You can get a firewall appliance that can filter out unwanted packets coming into your network. Many techniques are used in fire walling these include Stateful inspection of inbound packets to identify whether the inbound packets are requested by a user. Network Address translation where only one IP address is provided to interface to the world outside and this translates and controls the other computers on the Network. This is part of Windows Internet connection Sharing. Packet filtering and Proxy server are other techniques used.

Ethical Hacker

Can a hacker be considered to be ethical? What then does the term mean?

Ethical hacker is a person who legally attempt to break into a computer system. This is done with prior consent of the owner of the system or network. The purpose of breaking into the computer system is to check if there is any vulnerability and if the system can be hacked into by others. This is also called penetration testing.

Many ethical hackers are hackers who have turned into consultants to help prevent criminal intent hacking. Ethical hackers now have a certification called certified ethical hacking which makes them take an oath to a code of ethics in terms of hacking into others system.

Ethical hackers are also known as white hat hackers. Though the terms is meant to represent the good guys only they are another group of hackers who are known as grey hat hackers who sometimes function as ethical hackers and at other times are bad guys following black hat hacking methods.