We
all know that human being needs 5different elements to survive. No1 is Food ,
No2 is Water , No3 is Oxygen , No4 is House
and No5 is Clothes. But in 20th century you need 6 elements
to survive. Do you know what is the 6th element? It does not matter
much whether you are a farmer or a stock broker, if you want to take yourself to
the next level then you have to be a slave of internet. Yes the 6th
element is[ INTERNET ].
The
Internet is a network that links millions of computers around the world. Not so
long ago, few people had heard of the Internet. Today, the Internet has
revolutionized how people use computers. Many people depend on it daily to
communicate with others and to get the information they need. You don't have to
connect your computer to the Internet, but once you do, you'll probably wonder
how you lived without it.
Now a days internet became a daily
use product.From online shopping to weather forecast , Railway reservation to 1st
day 1st show movie ticket , Divine message to ingredients of a
potential Bomb everything what you want you can get by some clicks. Wikipedia,
Google, Yahoo, Facebook, Tweeter, Youtube, Photofunia, .net forum we all know
about this sites. Just think - how do u
feel if in a fine morning you want to video chat with your girlfriend/boyfriend
but you failed to find the facebook server. This invisible net bind us from top
to bottom.
Everybody
knows about the good side of internet but now I want to tell about the evil
side of internet. Unlike all other technology internet also have some bad
effect. In 20th century a kid may not know about Rabindranath Tagore
but he/she is familiar with the term [ HACKING ].
HACKING : It
means someone who finds
weaknesses in a computer or computer network, though the term can also refer to
someone with an advanced understanding of computers and computer networks. We
all know about fb apps but very few of us know that some apps content secret
cookies. Those apps give you a simple innocent looking link and ask you if you
want to know your girlfriend’s/boyfriend’s name then click on the link. If you
click on the link, Those cookies are so obedient to their master that they will
automatically saved in your browser and it will transfer every information
about your net banking account, emails, social networking profile to his master
without your permission.
Another type of hacking is software hacking. You will create
software and one group of people will break the entire security systemof your
software by adding some extra “dll” files and make free to all. This same
things can happen in the case of Books.
Today the biggest market of pirated product is internet.
Whatever you want, new games or upcoming game’s first looks that not yet
officially published by the company, new movie that released yesterday, new
video album of linking park you can
download, just you must know the right place.
Every one of us use social networking site but nobody reads
the security manual. We simple violate the rules and upload our personal
photos, videos and information. One wrong click can make your private life a
public topic. One hackerchoose his targets using a
two-pronged process known as the "pre-hacking stage".
Part 1: Targeting
The hacker determines what network to break into during this
phase. The target may be of particular interest to the hacker, either
politically or personally, or it may be picked at random. Next, they will port
scan a network to determine if it is vulnerable to attacks, which is just
testing all ports on a host machine for a response. Open ports—those that do
respond—will allow a hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the
target in some way in hopes of finding out vital information that will help
them access the system. The main way that hackers get desired results from this
stage is from "social engineering", which will be explained below.
Aside from social engineering, hackers can also use a technique called
"dumpster diving". Dumpster diving is when a hacker will literally
search through users' garbage in hopes of finding documents that have been
thrown away, which may contain information a hacker can use directly or
indirectly, to help them gain access to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the preliminary
target that he/she was planning to attack or steal. Many "hackers"
will be caught after this point, lured in or grabbed by any data also known as
a honeypot (a trap set up by computer security personnel).
CLASSIFICATION OF HACKER :Several subgroups of the
computer underground with different attitudes use different terms to demarcate
themselves from each other, or try to exclude some specific group with which
they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary)
advocates that members of the computer underground should be called crackers.
Yet, those people see themselves as hackers and even try to include the views
of Raymond in what they see as one wider hacker culture, a view harshly
rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give
more emphasis to a spectrum of different categories, such as white hat, grey
hat, black hat and script kiddie. In contrast to Raymond, they usually reserve
the term cracker for more malicious activity. According to (Clifford R.D. 2006)
a cracker or cracking is to "gain unauthorized access to a computer in
order to commit another crime such as destroying information contained in that
system".These subgroups may also be defined by the legal status of their
activities.
UOLOAD & SHARE :What 3rd party software you use to download videos
or movies or games or e-books? We all know “torrent” the largest server of
information. To download from torrents one special downloader is needed and it
is available for free. How much data you download from torrent the downloader
software upload that much of data from your hdd without your permission. You
can’t even know from which drive and what data the software will upload.
SPYWARE:It is a type of malware (malicious software) installed on computers that
collects information about users without their knowledge. The presence of
spyware is typically hidden from the user and can be difficult to detect. Some
spyware, such as keyloggers, may be installed by the owner of a shared,
corporate, or public computer intentionally in order to monitor users.
While the term spyware suggests
software that monitors a user's computing, the functions of spyware can extend
beyond simple monitoring. Spyware can collect almost any type of data,
including personal information like Internet surfing habits, user logins, and
bank or credit account information. Spyware can also interfere with user
control of a computer by installing additional software or redirecting Web
browsers. Some spyware can change computer settings, which can result in slow
Internet connection speeds, un-authorized changes in browser settings, or
changes to software settings.
Sometimes, spyware is included along with
genuine software, and may come from an official software vendor. In response to
the emergence of spyware, a small industry has sprung up dealing in
anti-spyware software. Running anti-spyware software has become a widely
recognized element of computer security practices for computers, especially
those running Microsoft Windows. A number of jurisdictions have passed
anti-spyware laws, which usually target any software that is surreptitiously
installed to control a user's computer.
CAN I GUESS YOUR PASSWORD:Is your browser secure enough
to surf private data. Let’s check how much secure your browser is …. Please
follow the steps…….
1- Open Internet explore
3- Type your mail id and password [ don’t press enter or don’t
hit sign in button].
4- Copy and paste this script into address bar and hit enter.
SCRIPT-
javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if%20(s)%20alert(%22[
AXEL BLAZE ]%20Says%20Password%20in%20forms%20on%20this%20page:\n\n%22%20+%20s);%20else%20alert(%22[BADBOY
]%20Says%20There%20are%20no%20passwords%20in%20forms%20on%20this%20page.%22);})();
HTTP
vs HTTPS : One day my
girlfriend just asked me that if the web browser says http:// and not https://
that my security is compromised. Is this true? If you're just browsing the web
and not entering any sensitive information, http:// is just fine. However, on
pages that you enter your password, credit card number, or other financial
information or personal information, you should always look for the https://
prefix. If you don't see the "s," don't enter any information that
you want to keep secure. HTTP stands for Hypertext Transfer Protocol. It's the
first element you see in any URL and you can think of it as the language used
to deliver information over the web. Most web browsers (including Internet
Explorer) use an encrypted protocol called Secure Sockets Layer (SSL) to access
secure webpages. These pages use the prefix HTTPS. The "s" stands for
secure.
LISTOFNOTABLEHACKER
GROUPS:
- Chaos Computer Club, is based in Germany and other German-speaking countries. Famous among older hackers.
- Masters of Deception, initial membership grew from meetings on Loop-Around Test Lines.
- w00w00, is currently one of the largest non-profit security teams in the world with more than 30 active participants.
- TESO, was a famous hacker group, which originated in Austria and quickly became international. It was active from 1998 to 2004, and during its peak around 2000, it was responsible for a significant share of the exploits on the bugtraq mailing list.
- L0pht, was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area.
- Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organisation founded in 1984 in Lubbock, Texas.
- milw0rm is a group of "hacktivists" best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Mumbai.
- TeaMp0isoN is a group of Black-Hat Computer Hackers established in mid-2009
- Anonymous, a group of hackers originating in 2003.
- LulzSec, a group of hackers originating and disbanding in 2011 that claimed to hack "for the lulz". Currently broken up.
- Decocidio is an anonymous, autonomous collective of hacktivists which is part of Earth First!!, a radical environmental protest organisation, and adheres to Climate Justice Action
Written By- Indrajit Chowdhury
( A creator not a follower )
No comments:
Post a Comment