answersLogoWhite

0

White Hat Computer Hacking

Questions concerning 'Ethical Hacking' curriculums such as that found in any of the official ethical hacking courses may be asked here.

500 Questions

How can hacking be dangerous?

User Avatar

Asked by Wiki User

Hacking is a matter that is dangerous to anyone, but it is especialy angerous to honest an naive because people of this nature generally tend to not know what they are oing or the dangers that they coul face because of their innocense.

What is trusted hacking software?

User Avatar

Asked by Wiki User

If Your Hacking A Website then I must say you should look for the Pirater.FB website as this website provide best hacking tools.

Is ethical hacking course and network security courses the same?

User Avatar

Asked by Wiki User

No, CCNA (Cisco Certified Network Associate) is an certification that validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN.

Security ethical hacking, goes more in detail about computer/software/network security.

Can clever bot people hack into your computer?

User Avatar

Asked by Wiki User

Yes, they can. Keep your antivirus updated and install a firewall. Do not open file attachments from people you do not know and do not click suspicious links... And so on.

EDIT: Simple answer, No. Cleverbot is a novelty AI chat website and does not have the ability to hack into your computer. No, malicious malware or trojan horse bots are installed. If you fear that sites like this can harm your computer, STAY OFF THE INTERNET!

How do you deal with a hacker?

User Avatar

Asked by Wiki User

use a sucure internet connection with high internet sucurety how do you get rid of an individual that is using their computer to listen to your conversations on your landline? you bring your computer to an expert and they can jail the hacker for you

What is the punishment if you are caught hacking into another computer?

User Avatar

Asked by Wiki User

Like any crime it depends on the country in question. Though with hacking you may be subjected to double the punishment. For example, you hack the US government but live in Ireland. Then Ireland will probably punish you but you can also be certain that the US government is going to want to extradite you for punishment there also. Some countries are very strict on hacking while others will protect their hackers - which has led to many rumours and conspiracy theories but that's a different question altogether.


Other factors will also be taking into account, such as was it just some guy sitting in his bedroom doing it so he could brag to his mates, or was it somebody trying to rob a bank or hack FBI for secret documents. The punishment for accessing United States government files is 7 years in federal prison and fines and for deleting these files 10 years in prison and fines. These fines can be in the millions.

How does someone commit computer hacking?

User Avatar

Asked by Wiki User

hello my name is BJ im 16 years old and iwant to hack my computer system beacuse he hacked my computer system first so ihope you could help me

What is the difference between hacking and cracking a computer?

User Avatar

Asked by Wiki User

The difference is basically that a Hacker uses their knowledge to only help the security of systems, a Cracker will use their knowledge to break the law. the terms are used interchangeably but they are not the same, to some it can be considered an insult to be called a Cracker over a Hacker.

How can you know if the person you are talking online is a hacker?

User Avatar

Asked by Wiki User

well look on the app talking angla and look at the screen shots and look at the eyes as you will see a room. and there has been stories about talking angla and talking tom. the hacker will hack into your phone, tablet if you have facebook they can look at your photos or instagram. NEVER GET THE GAMES ALWAYS LOOK CLOSELY AT THE SCREEN SHOTS! I have heard stories this might be right or wrong THIS IS WAHT HAPPEN TO MY FREIND IM NOT 100% SURE BUT THANKS!

DONT GET THOSE TALKING APPS THO!

What are the three types of hackers?

User Avatar

Asked by Wiki User

There are thee types of hackers white hat, grey hat, and black hat.

If a white hat hacker finds a fault in a security system ie. a website then they will inform the owner immediately.

Whereas if a grey hat hacker finds a fault he will do what he feels like at the time ie. exploiting the site OR informing the owner.

A black hat hacker if they find a fault will immediately exploit the site for there own beneficial gain ie. advertising and infecting other computers with "viruses" to gain access to more sites.

So a hacker can be many things from protecting systems by informing the owners or Exploiting and stealing data.

The most common name for the destructive type of "hacker" is a "cracker". I always try to refer to a bad hacker as a cracker to avoid confusion.

Also, there is a very important distinction between the three, as to both HOW and WHERE they attempt to break a system or program.

A White Hat (or, more properly, a "computer security specialist" or similar) will NEVER attempt to break into a system that they do not own or do not have explicit permission from the owner to do so. That means, they will usually be hired by a system or software owner to test the security of the said system or software package. They will always report their findings to the owner of the system, though there is somewhat of an ethical responsibility to report any significant (i.e. things that would impact the public) exploits to the community-at-large, if the original owner does not seem to be willing to address the issues - e.g. in case of a coverup of the problem, a White Hat is generally ethically bound to report the problem to the proper authorities, which may include public organizations such as CERT. More concisely, a White Hat is a professional, who abides by professional ethics and performs his or her duties out in the open.

Grey Hat folks generally don't have obvious ill intent (to contradict the previous answer). That is, they're not looking to exploit any problems for personal gain. However, they generally follow an ethic which believes that it is OK to perform intrusion and exploit scans on systems which they DON'T own or have permission to do so. This makes it hard for a target to determine the difference between a Grey and Black Hat hacker, as the initial method of operation looks identical. That said, Grey Hat folks generally report their findings to the target - that is, they'll inform the target as to what security issues they have found. Most Grey Hats will give the target a small window to address the issues; however, a GH will always report the issue to the wider media and security groups, and will NOT consider any information that the target wants to keep private. That is, GH folks seem to see themselves as "defenders of the public good", and that by exposing weaknesses of systems, they will ultimately force folks to be more secure. This is a plausible, but not provably true, scenario. Grey Hat folks are hobbiests and enthusiasts, who generally don't get paid for their work, but pursue it for personal reasons. They generally keep their identities masked (or at least don't usually broadcast them), as much of their work is quasi-illegal.

Black Hat folks, of course, are in it for the money (one way or the other). They're targets will never be informed of breaches, and in fact, most BH folks strive to keep their exploits secret from everyone, as it allows them to sneak in and steal information of value undetected. Black Hat folks are pure criminals.

What are hacking and cracking?

User Avatar

Asked by Wiki User

They are both the same thing...Sort of. A hacker is a person who is proficient with computers and/or programming to an elite level where they know all of the in's and out's of a system. There is NO illegality involved with being a hacker. A cracker is a hacker who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses etc. What the hacker does with their knowledge of systems within the definition of the law is what defines them as a hacker vs a cracker. It's then safe to say that all crackers are hackers, but not all hackers are crackers. This is an important distinction. The term cracker and hacker are used interchangeably (albeit incorrectly) largely due to the ignorance of the general populace, especially the media.

What are the good and the bad sides of hacking?

User Avatar

Asked by Wiki User

On Wikipedia, a hacker is defined as such:

"Hacker, as it relates to computers, has several common meanings. Hacker is often used by the mass media to refer to a person who engages in computer cracking and is also often by those in computing fields to refer to a person who is a computer enthusiast. At least three major hacker subcultures, characterized by their largely distinct historical development, use the term in their jargon for self-identification. They are centered around different, but partially overlapping aspects of computers and have conflicting ideas about who may legitimately be called a hacker (see hacker definition controversy). In computer security, a hacker is someone who focuses on security mechanisms. In common use, which was popularized by the mass media, that refers to someone who illegally breaks into computer and network systems. That is, the media portrays the 'hacker' as a villain. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. They operate under a code of the Hacker Ethic, in which it's acknowledged that breaking into other people's computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is nevertheless an interesting aspect that can be done in an ethical and legal way. This use is contrasted by the different understanding of the word as a person who follows a spirit of playful cleverness and loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with free software and open source. It also has a hacker ethic, based on the idea that writing software and sharing the result is a good idea, but only on a voluntary basis, and that information should be free, but that it's not up to the hacker to make it free by breaking into private computer systems. Academic hackers disassociate from the mass media's pejorative use of the word 'hacker' referring to computer security, and usually prefer the term 'cracker' for that meaning. In a third meaning, the term refers to computer hobbyists who push the limits of their software or hardware."

So by this definition the bad side is essentially fear mongering and a few individuals giving the whole group a bad name. According to the various legitimate definitions, there is plenty of good that can and has come from hacking. Most of the wondrous technical achievements of the past fifty years can be attributed to hackers at play, from the advent of video games with Spacewar! on the PDP-1 to the Mars rovers, and SpaceShipOne.

Every community will have its bad eggs, but if one only focuses on the few, they miss the benefit of the many.

Can you hack into your own computer?

User Avatar

Asked by Cheersav

Hacking your own laptop is being done by downloading and installing prorat tool of trojan horse..!!

After installing it at the specific time when you are involved in the internet, give your ip address at the specific place where needed.Then consequently it will provide a network connecting your laptop to your own laptop.Now using some basic command you can do whatever you want in your laptop without knowing about it to the user....!!

What courses do you need to become a hacker?

User Avatar

Asked by Wiki User

Secondary memory (or secondary storage) is the slowest and cheapest form of memory.It cannot be processed directly by the CPU. It must first be copied into a primary storage (Also known as a RAM) Secondary memory devices include magnetic disks like Hard Drives and Floppy disks; optical disks such as CDs and CDROMs; and magnetic tapes, which were the first forms of secondary memory... ---------------- Elizabeth Secondary memory (or secondary storage) is the slowest and cheapest form of memory.It cannot be processed directly by the CPU. It must first be copied into a primary storage (Also known as a RAM) Secondary memory devices include magnetic disks like Hard Drives and Floppy disks; optical disks such as CDs and CDROMs; and magnetic tapes, which were the first forms of secondary memory... ---------------- Elizabeth

What are the advantages of computer hacking?

User Avatar

Asked by Wiki User

Advantages, new system can be tested before lunch through hacking

What is the best way to stop people hacking in your computer?

User Avatar

Asked by Wiki User

The best way is to make a strong password on the account on your computer, and always log-out when you are done.

Plus, never tell your internet browser to 'remember' your passwords and always delete any suspicious e-mail, spam mail, viruses (using a virus protection software), and never open any suspicious attachments from e-mails.

What is the definition for Computer Hacking?

User Avatar

Asked by Wiki User

Hacking is the practice of illegally gaining access to a computer or network. The term hacking is also used to describe the art of opening up a piece of electronics and modifying it. Some people argue that illegal hackers should be called crackers. This opinion is not widely held. There are white hat hackers that legally test corporate security.

Many hackers justify their hacking by saying that information should be free or that they are finding holes, thus strengthen computer security by bringing these holes to the attention of system administrators. And since this is not the forum for debate I will not comment on those justifications.

What are the types of ethical hacking?

User Avatar

Asked by Wiki User

Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them. For example, a bank may pay a hacker to hack their systems to see if it is hackable. If he gets in, then they know there is potential for other people to hack in, and usually they will work with this ethical hacker to patch these holes. If he doesn't get in, then they pray that nobody is better at hacking than him. Let me add this. Hacking is simply exploring a computer's designed features, and learning how to exploit or take advantage of those features. As an example. a computer is designed to load instructions into memory using clearly defined rules, outlined in an RFC that spells out how to load something into memory. A hacker (white, grey, or black) looks at it this way. The RFC says to load an instruction into memory, use 8 bits of data, and two bits of instruction, then 8 more bits of data, and two more bits of instruction. A hacker looks at this and wonders, what if I pass 9 bits of data, what if I pass ten bits. etc. Sooner or later the computer will not be able to deal with the amount of data being passed in a manner it understands. Maybe it can accept 9 bits, 10 bits, and just ignore the discrepencies from the RFC, but sooner or later, the computer will not know how to interpret the instructions. When a computer does not know what to do next, it gives up and passes control to the SYSTEM, which is all powerful. This is a very basic description of a bufffer overflow. The hacker wants to force the computer to give up, and pass control to the SYSTEM. Once this happens, the hacker has administrative control and can now start passing commands to the computer that it will follow without question. There are three levels of hackers. White Hats spend all their time trying to break the system, to prove it can ge broke, so they can get the manufacurer to address the problem and fix it. Grey hats do the same thing, but perhaps will try to gain from their new way of breaking the system. They may expect payment for finding a way to break the system, and they may even try to get financial gain from their knowledge or silence. Black hats want to take the knowledge of how to break a system and use it for financial gain. They may use it to hack systems or write code that allows others to hack systems, and sell that code. All three are doing the same thing, trying to break the systems. The difference is what they intend to DO with the information once they discover it. Script Kiddies take the information that hackers discover, and try to use it for their own gain. They discover nothing, they just use what others have discovered, and try to copy it for their own gain.

Which cable is used to connect computer to computer?

User Avatar

Asked by Wiki User

There are many ways to transfer information between computers, iPods, or any other storage device. The way in which you do it depends largely on your own experience. knowledge, computer, and the tools available to you. Things such as Flash Drives, compact disks (CD's), Cross over cables, and File Transfer Protocols (FTP) are all tools that you can use to transfer files. This is a brief over view of the different forms of file transference.

The first way to transfer files is through USB Drives; often called jump or flash drives. They come in a variety of sizes from 124 megabytes to several gigabytes. This is a relatively simple process and does not require high levels of knowledge. Make sure your drive can hold the files you are transferring so you don't try moving a file that is too large. It wont let you do this and you will end up either buying a new drive or having to use an alternate method of transference.

The second method I listed was CD's. This is not limited to just compact disks and may include, DVD's, floppy disks, or any other form of removable media. Common CD's will tell you how much information they hold, which on average is 700 megabytes worth of information; DVD's can hold at least 4.7 megabytes. They come in formats such as CD-R. CD-RW, DVD-R, or DVD-RW. If a disk is followed by "-R" it stands for readable, and once the information is on there you can not remove it. If a disk is followed by "-RW" it means that it is readable and writable, meaning you can change the information that is written to the disk. To use this method you will need to have a CD drive that is capable of writing on these kinds of disks. Most computers bought today, if not all, that have a CD drive will be able to perform this service to you. This is relatively simple but can be time consuming.

The third method in the list is cross-over cables. These are specific hard wire cables that allow two computers to communicate and send information between one another. The cables fit into your network jack on the motherboard of your computers and requires both computers to be connected. This requires some networking skills from the user. You must be able to set up a file sharing connection with your LAN port. Windows does a good job of giving you a "Wizard" to get it set up with little difficulty for the user.

The last method is a File Transfer Protocol. This again requires for the two computers to be networked, but not directly. One computers must create a shared folder and put information in that folder to be shared on a network. You MUST be very cautious when using this method of file transference. It opens your shared information to being seen by hackers if they are "sniffing" your network. There are alternative programs that you can use to perform these operations, but they are not hack proof.

These are the multiple ways in which you can transfer files between computers. There are probably more ways than listed, but these are more common forms of sharing information. I have used all of these listed methods and know how they work. Good luck in transferring your files.

How do you stop hackers from hacking?

User Avatar

Asked by Wiki User

One of the most common ways to stop a hacker is to install a firewall onto your computer.

It is also a good idea to use complex passwords for your online accounts.

You can also refrain from providing any type of personal information over the internet.

If you know who the hacker is, you should report them.

What are the possible consequences of computer hacking?

User Avatar

Asked by Wiki User

A lot of bad things could happen. For example, the hacker could gain access to personal information like credit-card numbers, social security numbers, etc. You could also get a number of viruses that could render your computer unusable. If you really think your computer has been hacked, you should take it to a repair shop immediately.

This is very rare however, it's more likely that you just have a virus on your computer and it is extracting information from your hard-drive. A hacker is someone who actively take information from your computer and they can be taken to jail for doing so.

Can ethical hacking be justified?

User Avatar

Asked by Wiki User

Yes, it is legal to hacking ethically. It is a legal technique to evaluate a system's security to find any possible errors by employing a range of techniques. Ethical hackers operate with the owner's permission, and their actions are watched to make sure they aren't damaging the system or the data.

Who are hackers?

User Avatar

Asked by Wiki User

i know a website which is best for cyber . if you have any question visit our site

Counting down the days, hours, minutes and seconds until Cyberpunk 2077 game

Cyberpunk 2077

Counting down the days, hours, minutes and seconds until Cyberpunk 2077 game