Friday 6 June 2014


A typical attacker follows some steps:
* Identify the target system
* Gathering information about the targeted system
* Finding the possible loopholes
* Exploiting those loopholes
* Escaping without a trace

Types of attacks the system might face:
It is the responsibility of the administrator to protect the system from various attacks. Some types of attacks:
* DOS attacks
          Flooding a host with sufficient network traffic.
* Theft from key logging
          Logging the key strokes that the user presses.
* Trojan attacks
* Brute force attack
          Trial and error used to guess a user’s username, password, credit card number.
* IP Spoofing
          Faking the original IP address.
* Phreaking
          Form of cracking the telecom networks.
* Cross Site Scripting (XSS)
          Inserting the scripted code into another site’s web page.
* Phishing
          Getting someone’s personal information through emails.

How to prevent your system from hackers:
*  Keep your antivirus up-to date
* Patch the security holes frequently if you have knowledge about system.
* Turn on firewall.
* Try to maintain backup of your system.
* Setup intrusion detection systems.
* Encrypt your important data.
* Avoid entertaining untrusted pop-ups.
*  Use anti-key loggers.
* If you are accessing your accounts on some other systems make sure that there are no key loggers installed on that otherwise use virtual keyboard.


Because hackers can affect your system adversely there are people who help you from hackers. These are ethical hackers.

Tuesday 27 May 2014

Hacking:

Many of us are unaware of the word ethical hacking. Before I explain you about ethical hacking let me tell you something about hacking.

Hacking refers to the activities which are carried out to intrude into someone's personal information space without the permission. Hacking can be done intentionally and unintentionally.
So be careful when you are accessing someone's information. You might get stuck in legal matters. :)

There is a small difference between hackers and ethical hackers.
In a lay man’s language (language which can be understood by common man) the difference between a hacker and an ethical hacker can be made as. A hacker is a person who tries to access the system without the owner’s permission. Ethical hackers are those guys who access your system with your permission.
A hacker is someone who has achieved some level of expertise in computers.

The term hacking was coined by cyberspace in 1980's.
In 2007 the Swedish bank was hit by the "biggest ever" hack.

Some of the famous hackers in history:

* Ian Murphy
* Kelvin Mitnick
* Linus Torvalds
* Gary McKinnon

* Matthew Bevan and Richard Pryce
* and many more