About Me

My photo
Anantapur, Andhra Pradesh, India
Sanskrithi School of Business, Puttaparthi is affiliated to Jawaharlal Nehru Technological University - Anantapur (JNTUA) has obtained recognition by the AICTE in the year 2010. It is emerging steadily as the leading residential Business School in Andhra Pradesh with International standards. The institution located in the adobe of Bhagawan Sri Sathya Sai Baba, is engaged in nation building on the foundation of ethical and moral values as enunciated by Bhagawan Sri Sathya Sai Baba

Friday 12 October 2012

The Net



  We all know that human being needs 5different elements to survive. No1 is Food , No2 is Water , No3 is Oxygen , No4 is House  and No5 is Clothes. But in 20th century you need 6 elements to survive. Do you know what is the 6th element? It does not matter much whether you are a farmer or a stock broker, if you want to take yourself to the next level then you have to be a slave of internet. Yes the 6th element is[ INTERNET ].
  The Internet is a network that links millions of computers around the world. Not so long ago, few people had heard of the Internet. Today, the Internet has revolutionized how people use computers. Many people depend on it daily to communicate with others and to get the information they need. You don't have to connect your computer to the Internet, but once you do, you'll probably wonder how you lived without it.
           Now a days internet became a daily use product.From online shopping to weather forecast , Railway reservation to 1st day 1st show movie ticket , Divine message to ingredients of a potential Bomb everything what you want you can get by some clicks. Wikipedia, Google, Yahoo, Facebook, Tweeter, Youtube, Photofunia, .net forum we all know about this sites. Just think -  how do u feel if in a fine morning you want to video chat with your girlfriend/boyfriend but you failed to find the facebook server. This invisible net bind us from top to bottom.
Everybody knows about the good side of internet but now I want to tell about the evil side of internet. Unlike all other technology internet also have some bad effect. In 20th century a kid may not know about Rabindranath Tagore but he/she is familiar with the term [ HACKING ].
HACKING : It means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks. We all know about fb apps but very few of us know that some apps content secret cookies. Those apps give you a simple innocent looking link and ask you if you want to know your girlfriend’s/boyfriend’s name then click on the link. If you click on the link, Those cookies are so obedient to their master that they will automatically saved in your browser and it will transfer every information about your net banking account, emails, social networking profile to his master without your permission.
Another type of hacking is software hacking. You will create software and one group of people will break the entire security systemof your software by adding some extra “dll” files and make free to all. This same things can happen in the case of Books.
Today the biggest market of pirated product is internet. Whatever you want, new games or upcoming game’s first looks that not yet officially published by the company, new movie that released yesterday, new video album of linking park   you can download, just you must know the right place.
Every one of us use social networking site but nobody reads the security manual. We simple violate the rules and upload our personal photos, videos and information. One wrong click can make your private life a public topic.       One hackerchoose his targets using a two-pronged process known as the "pre-hacking stage".
Part 1: Targeting
The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).
CLASSIFICATION OF HACKER :Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie. In contrast to Raymond, they usually reserve the term cracker for more malicious activity. According to (Clifford R.D. 2006) a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system".These subgroups may also be defined by the legal status of their activities.
UOLOAD & SHARE :What 3rd party software you use to download videos or movies or games or e-books? We all know “torrent” the largest server of information. To download from torrents one special downloader is needed and it is available for free. How much data you download from torrent the downloader software upload that much of data from your hdd without your permission. You can’t even know from which drive and what data the software will upload.
SPYWARE:It is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.
While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with user control of a computer by installing additional software or redirecting Web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.
Sometimes, spyware is included along with genuine software, and may come from an official software vendor. In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.
CAN I GUESS YOUR PASSWORD:Is your browser secure enough to surf private data. Let’s check how much secure your browser is …. Please follow the steps…….
1-      Open Internet explore
2-      Go to www.gmail.com
3-      Type your mail id and password [ don’t press enter or don’t hit sign in button].
4-      Copy and paste this script into address bar and hit enter.
SCRIPT- javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if%20(s)%20alert(%22[ AXEL BLAZE ]%20Says%20Password%20in%20forms%20on%20this%20page:\n\n%22%20+%20s);%20else%20alert(%22[BADBOY ]%20Says%20There%20are%20no%20passwords%20in%20forms%20on%20this%20page.%22);})();
HTTP vs HTTPS : One day my girlfriend just asked me that if the web browser says http:// and not https:// that my security is compromised. Is this true? If you're just browsing the web and not entering any sensitive information, http:// is just fine. However, on pages that you enter your password, credit card number, or other financial information or personal information, you should always look for the https:// prefix. If you don't see the "s," don't enter any information that you want to keep secure. HTTP stands for Hypertext Transfer Protocol. It's the first element you see in any URL and you can think of it as the language used to deliver information over the web. Most web browsers (including Internet Explorer) use an encrypted protocol called Secure Sockets Layer (SSL) to access secure webpages. These pages use the prefix HTTPS. The "s" stands for secure.
LISTOFNOTABLEHACKER GROUPS:
  • Chaos Computer Club, is based in Germany and other German-speaking countries. Famous among older hackers.
  • Masters of Deception, initial membership grew from meetings on Loop-Around Test Lines.
  • w00w00, is currently one of the largest non-profit security teams in the world with more than 30 active participants.
  • TESO, was a famous hacker group, which originated in Austria and quickly became international. It was active from 1998 to 2004, and during its peak around 2000, it was responsible for a significant share of the exploits on the bugtraq mailing list.
  • L0pht, was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area.
  • Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organisation founded in 1984 in Lubbock, Texas.
  • milw0rm is a group of "hacktivists" best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Mumbai.
  • TeaMp0isoN is a group of Black-Hat Computer Hackers established in mid-2009
  • Anonymous, a group of hackers originating in 2003.
  • LulzSec, a group of hackers originating and disbanding in 2011 that claimed to hack "for the lulz". Currently broken up.
  • Decocidio is an anonymous, autonomous collective of hacktivists which is part of Earth First!!, a radical environmental protest organisation, and adheres to Climate Justice Action

Written By- Indrajit Chowdhury
 ( A creator not a follower )


No comments: