This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Ethical Hacker

Can a hacker be considered to be ethical? What then does the term mean?

Ethical hacker is a person who legally attempt to break into a computer system. This is done with prior consent of the owner of the system or network. The purpose of breaking into the computer system is to check if there is any vulnerability and if the system can be hacked into by others. This is also called penetration testing.

Many ethical hackers are hackers who have turned into consultants to help prevent criminal intent hacking. Ethical hackers now have a certification called certified ethical hacking which makes them take an oath to a code of ethics in terms of hacking into others system.

Ethical hackers are also known as white hat hackers. Though the terms is meant to represent the good guys only they are another group of hackers who are known as grey hat hackers who sometimes function as ethical hackers and at other times are bad guys following black hat hacking methods.

Email Hacking

Email hacking seems to be a misnomer as most of the sites that provide you email services are rather secured from hacking. They provide you secure connection when you log in.

Email hacking is all about how you use your mail account. It is not the web server that can be hacked but the email client on your system. This provides the hacker the mail you have saved on the local folders including the address book and personal details of your contacts in the address list.

Another means is to get the passwords of your email account. This can be done in a variety of ways. One method is to get the password from the file that is stored on the PC. This file contains the password only if you chose the option of "remembering your email ID and password" when you log in.

The second method to email password hacking is to try the various possible combinations of passwords you are likely to use. This is a guess work and is more or less done on personal information about you like dates of birth, anniversaries, Names of your wife's, kids or pets since these are commonly used as passwords. The third method is a key logger software.

Credit Card Hacking

Credit card hacking is essentially identity theft. It is deliberate use of the identity of someone else so that you could get a great deal of financial gain. Identity theft is a serious breach of privacy. Identity theft can be carried out by a number of methods.

One it can be done online by a spurious website offering you some services and getting your personal details to carry out their modus operandi later on. Sometimes these site follow credit hijacking where they continue to bill you small amount monthly so that you will not recognize the difference.

Two it can be done with special electronic gadgets that are able to read your credit card and reproduce the information on fake cards. They also use a spy Camera to record your PIN numbers or code for authentication. Then they use this information for illegal withdrawals of cash or purchase of merchandise.

Three credit card hacking involves hacking into computers that contain all the data of credit card users and the availing that data for fraudulent means.

Cracking

Cracking is the aspect of breaking into a computer system. It can also be the act of breaking copy protection of a commercial program. It can be removing the license that copyrights a software or program. Usually it is a patch or a series of instruction to remove the copy protection so that the features of the program are changed from the demo version to full time version. In some ways it is also termed as an exploit that cracker accomplish with tools that aid them.

Cracking is done by the spread of root kit Trojans so that accessing is gained into other systems with out much of programming effort. The same goes to removing the license or copyright protections from programs. They think themselves as better than the programmers who have created the copyright or license protections but this effort is mediocre since they use automated tools. Hence those following these methods are not given the term hackers; rather they are termed as crackers.

Computer Hacking

Computer hacking is a term used to represent illegal access to a resource of another persons computer. Hacking of a computer requires proficiency in programming, knowledge of the operating system or applications, and knowledge of hacking tools.

Initially the term hacker was used approvingly to acknowledge prowess in programming skills. Now it is a derogatory term used to denote criminals who have gained access to other computers and stolen data or personal information. This information is then sold to third parties for a sum. The term hacker was more than often wrongly used by the press and the term has hence stuck to the derogatory connotation of a programming.

Computer hacking is now performed using a variety of software's. These softwares can be downloaded from a number of sites. Using these softwares it is become easy for even teenagers who do not have programming knowledge to gain access to a computer that is not secure enough. Most teenagers take to computer hacking just to make a publicity statement among their peer group. This has landed quite a few teenagers in trouble as they had gone from proving themselves to making a fast buck in the process.

Crackers

Computer hacking is a term used to represent illegal access to a resource of another persons computer. Hacking of a computer requires proficiency in programming, knowledge of the operating system or applications, and knowledge of hacking tools.

Initially the term hacker was used approvingly to acknowledge prowess in programming skills. Now it is a derogatory term used to denote criminals who have gained access to other computers and stolen data or personal information. This information is then sold to third parties for a sum. The term hacker was more than often wrongly used by the press and the term has hence stuck to the derogatory connotation of a programming.

Computer hacking is now performed using a variety of software's. These softwares can be downloaded from a number of sites. Using these softwares it is become easy for even teenagers who do not have programming knowledge to gain access to a computer that is not secure enough. Most teenagers take to computer hacking just to make a publicity statement among their peer group. This has landed quite a few teenagers in trouble as they had gone from proving themselves to making a fast buck in the process.

Bluetooth Hacking

Blue tooth is a wireless technology meant for Personal Area Networks. It is a standard for short range communications (10 meters and a bit more). The communication may be point to point /multipoint. Used mainly in cellular phones, PDA's and laptops this technology has been subject to hacking by unscrupulous persons.

After it was proved that it is devices were subject to theft of data the term bluesnarfing came for be used to signify the process of illegal retrieving data from calendar, contact list, emails and text messages of a mobile phone.

Blue jacking is a simple act of sending a Bluetooth device an unsolicited message like a vcard with name and message field. It is used for bluedating and bluechatting. This is done using the OBEX protocol.

With the various attempt and proof of the concept that Bluetooth devices can be bluejacked security in the communication between wireless devices have been enabled. You could also be on the safe side by turning off your Bluetooth connection when you do not require it.