White Hat Computer Hacking

Questions concerning 'Ethical Hacking' curriculums such as that found in any of the official ethical hacking courses may be asked here.

793 Questions
Jobs
White Hat Computer Hacking
Social Media

Excessive computerization is stealing jobs from the people?

I agree, computerization will lessen the use of human labor.

My team & I offer the best hacking services.We can hack/recover any email id,mobile

phone,FACEBOOK & website servers & grant our clients access..We always provide proof before payment so you know you are not being ripped off.Send me a mail "zilchex@gmx.com".We try to reply every client ASAP & execute the project in the quickest time-frame possible.

#Patience is the first weapon!#

My team & I offer the best hacking services.We can hack/recover any email id,mobile

phone,FACEBOOK & website servers & grant our clients access..We always provide proof before payment so you know you are not being ripped off.Send me a mail "zilchex@gmx.com".We try to reply every client ASAP & execute the project in the quickest time-frame possible.

#Patience is the first weapon!#

148149150
Computer Terminology
White Hat Computer Hacking
The Difference Between

What is the difference between hacking and cracking?

They are both the same thing...Sort of. A hacker is a person who is proficient with computers and/or programming to an elite level where they know all of the in's and out's of a system. There is NO illegality involved with being a hacker. A cracker is a hacker who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses etc. What the hacker does with their knowledge of systems within the definition of the law is what defines them as a hacker vs a cracker. It's then safe to say that all crackers are hackers, but not all hackers are crackers. This is an important distinction. The term cracker and hacker are used interchangeably (albeit incorrectly) largely due to the ignorance of the general populace, especially the media.

105106107
Computer Networking
Toys
White Hat Computer Hacking

What is the best hacking software?

If Your Hacking A Website then I must say you should look for the Pirater.FB website as this website provide best hacking tools.

777879
Computer Viruses
Computer Security
White Hat Computer Hacking

What is hacking?

Hacking is the act of breaking in to a computersystem and is a criminal offence under the computer misuse.

Answer:The really simple definition of hacking: is gaining an unauthorized access to a computer system.Answer:Hacking, for the most part is about learning how a system works and how to make it do things it wasn't designed to do, or you haven't got the privileges to do. Answer:

Usually people instantly think hacking is gaining access into a server, taking a copy of a credit card database or some other attack. This is one end of the spectrum. The other end (the most common end), is perhaps best reflected in wireless routers. A hacker buys a Linksys router, realises that the hardware is extraordinarily limited, and then flashes it and installs new firmware and after a few more tweaks is able to have a cheap router doing the job of a very expensive cisco router.

656667
White Hat Computer Hacking
Roblox

Is ROBLOX safe?

Yes

525354
White Hat Computer Hacking
Cleverbot

Can clever bot people hack into your computer?

Yes, they can. Keep your antivirus updated and install a firewall. Do not open file attachments from people you do not know and do not click suspicious links... And so on.

EDIT: Simple answer, No. Cleverbot is a novelty AI chat website and does not have the ability to hack into your computer. No, malicious malware or trojan horse bots are installed. If you fear that sites like this can harm your computer, STAY OFF THE INTERNET!

575859
Computer Networking
Computer Programming
White Hat Computer Hacking
Sony Playstation 3

How do you become a hacker?

The formal way to do this would be to take 3 courses, those being:

Comptia A+ (where you learn all about computers and how they work)

Comptia N+ (where you learn all about networks)

Certified Ethical Hacker (Where you learn how to be a hacker)

The usual way, or common way is to teach yourself. But the problem here, I find, is most people just want to go on youtube and watch a few videos and expect to become good hackers. By doing this, all you will ever learn is a few tricks, you wont learn much in the way of hacking skills, just tidbits really.

If you are dedicated to teach yourself, learn how a computer works. Learn about the different parts and learn machine code- assembly.

After this, learn networking. As it is the base of the internet and pretty much any connection between two or more PCs.

575859
White Hat Computer Hacking
Roblox

Is roblox safe to download?

Roblox is safe to download, as long as you get it from the offical site. It's a free game to play and, safe for kids. For the parents, you can also create a parent account to view your child and what he/she is doing. You can make it "safe chat" or "free chat".

616263
Internet
Computer Programming
White Hat Computer Hacking

What is the concept of hacking?

Hacking is the practice of understanding the workings of a system. Hackers do not Break into systems, do anything illegal, or unlawful. Hackers are intelligent people who do not abuse privileges or discoveries. If you are trying to break into a system or something, You are committing a crime. This is called cracking. Cracking is ILLEGAL. Cracking is also unlawful and should be avoided.

555657
Internet Security and Privacy
White Hat Computer Hacking

Correct order of the three pre-hacking phases?

Foot-printing

Scanning, and

Enumeration

535455
Computer Programming
White Hat Computer Hacking

Difference between ethical hacking and security testing?

The connection between ethical hacking and penetration testing is fairly straightforward, as the former typically involves the use of the latter. Ethical hacking refers to actions of people employed by a company to attempt to hack into that company's system or network, to demonstrate weaknesses or ways in which someone may launch a malicious attack against that company. Penetration testing is basically an attempt to penetrate a secure system in order to mimic the way someone may maliciously attack the system. This means that people are often hired by a company to engage in ethical hacking and penetration testing for that company.

535455
Computer Viruses
Backdoors
White Hat Computer Hacking

How do you spike someone who is hacking your computer?

Although it may be possible to "spike" a hacker there are programs that allow you to perform an IP Tracer which can be found at http://download.visualware.com/internetsecurity/index.html

But it is far better to inform athorities of the Hacking IP address inwhich the hacker will be delt with accordingly.

To "spike" them and cause damage means you are no better than the hacker and can ultimatly get you in trouble or if the serge is too great you may cause harm to the user. In Australia tough new penalities being considered for computer hackers where New Federal laws are being developed to stiffen the penalties for computer hacking and other forms of cybercrime.

The new bill would lift the maximum penalty for computer crime to 10 years
jail.
http://www.australianlawonline.gov.au/accesspoint?action=menuHome

495051
Internet
White Hat Computer Hacking
Muscular System
Consumers (food chain)

What are the three types of hackers?

There are thee types of hackers white hat, grey hat, and black hat.

If a white hat hacker finds a fault in a security system ie. a website then they will inform the owner immediately.

Whereas if a grey hat hacker finds a fault he will do what he feels like at the time ie. exploiting the site OR informing the owner.

A black hat hacker if they find a fault will immediately exploit the site for there own beneficial gain ie. advertising and infecting other computers with "viruses" to gain access to more sites.

So a hacker can be many things from protecting systems by informing the owners or Exploiting and stealing data.

The most common name for the destructive type of "hacker" is a "cracker". I always try to refer to a bad hacker as a cracker to avoid confusion.

Also, there is a very important distinction between the three, as to both HOW and WHERE they attempt to break a system or program.

A White Hat (or, more properly, a "computer security specialist" or similar) will NEVER attempt to break into a system that they do not own or do not have explicit permission from the owner to do so. That means, they will usually be hired by a system or software owner to test the security of the said system or software package. They will always report their findings to the owner of the system, though there is somewhat of an ethical responsibility to report any significant (i.e. things that would impact the public) exploits to the community-at-large, if the original owner does not seem to be willing to address the issues - e.g. in case of a coverup of the problem, a White Hat is generally ethically bound to report the problem to the proper authorities, which may include public organizations such as CERT. More concisely, a White Hat is a professional, who abides by professional ethics and performs his or her duties out in the open.

Grey Hat folks generally don't have obvious ill intent (to contradict the previous answer). That is, they're not looking to exploit any problems for personal gain. However, they generally follow an ethic which believes that it is OK to perform intrusion and exploit scans on systems which they DON'T own or have permission to do so. This makes it hard for a target to determine the difference between a Grey and Black Hat hacker, as the initial method of operation looks identical. That said, Grey Hat folks generally report their findings to the target - that is, they'll inform the target as to what security issues they have found. Most Grey Hats will give the target a small window to address the issues; however, a GH will always report the issue to the wider media and security groups, and will NOT consider any information that the target wants to keep private. That is, GH folks seem to see themselves as "defenders of the public good", and that by exposing weaknesses of systems, they will ultimately force folks to be more secure. This is a plausible, but not provably true, scenario. Grey Hat folks are hobbiests and enthusiasts, who generally don't get paid for their work, but pursue it for personal reasons. They generally keep their identities masked (or at least don't usually broadcast them), as much of their work is quasi-illegal.

Black Hat folks, of course, are in it for the money (one way or the other). They're targets will never be informed of breaches, and in fact, most BH folks strive to keep their exploits secret from everyone, as it allows them to sneak in and steal information of value undetected. Black Hat folks are pure criminals.

474849
White Hat Computer Hacking

What is ethical hacking?

Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them. For example, a bank may pay a hacker to hack their systems to see if it is hackable. If he gets in, then they know there is potential for other people to hack in, and usually they will work with this ethical hacker to patch these holes. If he doesn't get in, then they pray that nobody is better at hacking than him. Let me add this. Hacking is simply exploring a computer's designed features, and learning how to exploit or take advantage of those features. As an example. a computer is designed to load instructions into memory using clearly defined rules, outlined in an RFC that spells out how to load something into memory. A hacker (white, grey, or black) looks at it this way. The RFC says to load an instruction into memory, use 8 bits of data, and two bits of instruction, then 8 more bits of data, and two more bits of instruction. A hacker looks at this and wonders, what if I pass 9 bits of data, what if I pass ten bits. etc. Sooner or later the computer will not be able to deal with the amount of data being passed in a manner it understands. Maybe it can accept 9 bits, 10 bits, and just ignore the discrepencies from the RFC, but sooner or later, the computer will not know how to interpret the instructions. When a computer does not know what to do next, it gives up and passes control to the SYSTEM, which is all powerful. This is a very basic description of a bufffer overflow. The hacker wants to force the computer to give up, and pass control to the SYSTEM. Once this happens, the hacker has administrative control and can now start passing commands to the computer that it will follow without question. There are three levels of hackers. White Hats spend all their time trying to break the system, to prove it can ge broke, so they can get the manufacurer to address the problem and fix it. Grey hats do the same thing, but perhaps will try to gain from their new way of breaking the system. They may expect payment for finding a way to break the system, and they may even try to get financial gain from their knowledge or silence. Black hats want to take the knowledge of how to break a system and use it for financial gain. They may use it to hack systems or write code that allows others to hack systems, and sell that code. All three are doing the same thing, trying to break the systems. The difference is what they intend to DO with the information once they discover it. Script Kiddies take the information that hackers discover, and try to use it for their own gain. They discover nothing, they just use what others have discovered, and try to copy it for their own gain.

394041
Computer Security
White Hat Computer Hacking

Is it easy for people to steal someone else's passwords?

The ease or difficulty depends almost entirely on two factors: (1) the ease with which the server containing the relevant passwords can be hacked, i.e. if you want Jane's Amazon password, this metric would concern the difficulty of hacking into Amazon, and (2) the ease with which the individual computer where the password is used can be breached, i.e. access to Jane's computer. The third most important factor, but it is distant, is the simplicity of the password. Passwords like bu6iFL5apgt70pXa are much harder to crack than 123456.

However, hacking is a crime in almost every country and should not be performed. This answer is only to demonstrate the ease or difficulty of performing such an activity.

414243
Computer Viruses
Internet
White Hat Computer Hacking

How do you stop internet hackers?

they really cannot be stoppped but you can try to prevent them from accessing your machine as best as you can eg windows firewall any virus program that has an additional firewall and spyware detectors and eliminators to keep their trojans and spying tools out your machine keep a close eye on the emails and attachments you open that's their way in along with web sites

414243
Computers
Internet
Windows XP
White Hat Computer Hacking

Why does the computer freezes after logging in?

Because there are too many tasks and settings or it's RAM, which it must complete at the startup.

353637
Internet
Computer Programming
White Hat Computer Hacking

Are hackers a problem where you life?

---- == == ---- == == ---- == == ---- == == ---- == == ---- == == ---- == == ---- == == ---- == == ---- == ==

333435
Business Ethics
Ethics and Morality
White Hat Computer Hacking

What does ethical mean?

Ethicical means doing something right or wrong

212223
Internet
Computer Programming
White Hat Computer Hacking

What is the scope of a ethical hacker?

Since security is week in all technical fields... ethical hackers are brought into work for the corporate sectors with high wages... All ethical hackers have a great scope in nearly future.. if you have any disagreement in my idea about ethical hackers you can mail your concepts to "pown.raj77@gmail.com" For futher informations about ethical hacking you can contact me through my mail id..

192021
Computer Programming
White Hat Computer Hacking
The Sims 3

Is wanting to become a computer hacker bad?

It depends on what you mean by hacker.

Being a true hacker is someone who knows lots about a particular technology and is good at modifying it to make it better. Whether hacking is a good or bad thing depend on what you hack. If you hack some thing with a copyright or cause destruction then yes it is bad. If you use those skills to improve open source software, do legal penetration testing, digitalize a toaster, build your own chat program, ect. then hacking is a good, legal, and fun hobby or possibly even a profession.

313233
Computers
Law & Legal Issues
White Hat Computer Hacking

Is hacking good?

Hacking is not just illegal, but cracking is. There is a general misconception that a hacker is a bad guy. A hacker is a computer guru, passionate, etc, that understand how system work. They do nothing illegal. However, a cracker is someone that uses computer skills to do illegal stuff. That is cracking, which is bad.

313233
White Hat Computer Hacking
Computers

Advantage and disadvantages of computer hacking?

Advantages-

-Can be used to recover lost information where the computer password has been lost.

-Teaches u that no technology is 100% secure

Disadvantages-

-Criminals can use it to their advantage.

-It can harm someone's privacy

232425
Computer Viruses
Anti-Virus Software
White Hat Computer Hacking

What are the good and the bad sides of hacking?

On Wikipedia, a hacker is defined as such:

"Hacker, as it relates to computers, has several common meanings. Hacker is often used by the mass media to refer to a person who engages in computer cracking and is also often by those in computing fields to refer to a person who is a computer enthusiast. At least three major hacker subcultures, characterized by their largely distinct historical development, use the term in their jargon for self-identification. They are centered around different, but partially overlapping aspects of computers and have conflicting ideas about who may legitimately be called a hacker (see hacker definition controversy). In computer security, a hacker is someone who focuses on security mechanisms. In common use, which was popularized by the mass media, that refers to someone who illegally breaks into computer and network systems. That is, the media portrays the 'hacker' as a villain. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. They operate under a code of the Hacker Ethic, in which it's acknowledged that breaking into other people's computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is nevertheless an interesting aspect that can be done in an ethical and legal way. This use is contrasted by the different understanding of the word as a person who follows a spirit of playful cleverness and loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with free software and open source. It also has a hacker ethic, based on the idea that writing software and sharing the result is a good idea, but only on a voluntary basis, and that information should be free, but that it's not up to the hacker to make it free by breaking into private computer systems. Academic hackers disassociate from the mass media's pejorative use of the word 'hacker' referring to computer security, and usually prefer the term 'cracker' for that meaning. In a third meaning, the term refers to computer hobbyists who push the limits of their software or hardware."

So by this definition the bad side is essentially fear mongering and a few individuals giving the whole group a bad name. According to the various legitimate definitions, there is plenty of good that can and has come from hacking. Most of the wondrous technical achievements of the past fifty years can be attributed to hackers at play, from the advent of video games with Spacewar! on the PDP-1 to the Mars rovers, and SpaceShipOne.

Every community will have its bad eggs, but if one only focuses on the few, they miss the benefit of the many.

272829
Computer Programming
White Hat Computer Hacking
Software Security

What difference between ethical hacking and penetration testing?

According to the EC-Council's Certified Ethical Hacker course documentation the two can be defined as follows; Penetration Testing:

A goal-oriented project of which the goal is the trophy and includes gaining privileged access by pre-conditional means.Ethical Hacking:

A penetration test of which the goal is to discover trophies throughout the network within the predetermined project time limit. For me reading that I would say difference is; a pen-test has a single goal (trophy) and strict procedures that have to be followed to get that trophy, and an ethical hack is a much larger beast that involves many goals or trophies, could last so long it needs to be time restricted, and in general has less limits. So a pen-test is "one goal, one process" and ethical hacking is "hack everything that can be hacked... ...ethically"

212223

Copyright © 2020 Multiply Media, LLC. All Rights Reserved. The material on this site can not be reproduced, distributed, transmitted, cached or otherwise used, except with prior written permission of Multiply.