answersLogoWhite

0

White Hat Computer Hacking

Questions concerning 'Ethical Hacking' curriculums such as that found in any of the official ethical hacking courses may be asked here.

298 Questions

How can you turnoff your computer safely when it gets stuck?

Basically, you mean if your computer crashes.

There is no safe way to turn off the computer but the best way to from the power switch (normally hold down for around 2-3 seconds).

You would try and solve this crashing problem as it may cause problems in the future.

Is Hacking Stealing?

It can be if that was your main purpose of hackng

Do ethical hackers break into someone else's computer?

It's a very good possibility, ethical hackers are usually employed by a company to attempt to hack into security to check defenses. Definitely.

Is uplink real hacking or just a game?

meen thats what am asking too , i crack somany paswords but i can't make use of my money

Is hacking rude?

Yes. people put time into making sites and games and if you hack it you could really mess it up

Can reverse engg be applied on ActiveX object file and source code of it can be found?

No. You cannot retrieve the original source code through reverse engineering. At best you can disassemble the machine code. The resultant code is not unlike assembly language, however there are no comments or identifiers to assist you.

Can cops hack into your computer without your knowledge?

YES absolutely. However normally the only law enforcement agencies that have ALL the capabilities to do that are the FBI and CIA. Microsoft "claims" that the reason you have to register Vista and Windows 7 online is to combat software piracy, but in fact, it allows Microsoft to scan your PC whenever, and also to allow the FBI or CIA into your computer under the guise of looking for terrorism. They do this through a "back door" that is placed on your computer and law enforcement and Microsoft are not the only ones who can figure out how to exploit the back door. This "right" they have to invade your computer without your knowledge is granted to them by the patriot act.

And I don't care if you don't like George Bush, whoever edited my answer to delete Bush's name has no business doing so. So stop editing my answers. If you don't like the truth, find another line of work.

What are the laws against hacking in computer?

1) Stop Online Piracy Act(SOPA)

2)Internet Spyware Prevention Act(SPY)

Can contacts be emailed if computers been hacked?

Yes definitely, hackers get into the emails of people by secretly hiding a RAT program in the seemingly innocent file the user downloads. The user opens it, and now there is a link between the hacker's computer, and the user, the hacker can then use a service called a keylogger and track every button you press on a keyboard.

How do you support your computer from hacking onto your computer internet?

Its very important to protect your computer from any unauthorized access. There are various ways through which we can protect our computer like installing folder lock, user authentication program, etc. If you use internet through your computer regularly then it becomes mandatory to install antivirus softwares so that your computer is protected from virus attacks through internet.

But sometimes these things are very difficult to check and maintain, in that case its good to have some technical support advice so that u do not do any mistakes. If you want any help or guidance on this u can always get best help from HCL Touch a leading computer support service provider, they are accessible at: www.hcltouch.com

What are your ethical thoughts for hacking?

Hacking, in terms of computer hacking, is not a very ethical thing to do. By hacking a computer, you are trying to do whatever you should not be doing in the first place, such as hacking a password, hacking someone's ID, etc. Now, if you are hacking a computer to improve your own or someone else's benefit, such as putting up a firewall, that is a good thing to do. It just depends on which side of the line you are on that determines if hacking is ethical.
Only that if you hacked some one's system, don't misuse it.

Is hacking is a good thing?

on a horse yes haking into someones account on a site is bad and is bad for you reputation

it is a cyber crime. it detructs many of lives

What is a white hacker?

· White hat hackers use their skills for legitimate reasons, such as modifying software to make a program more efficient.

Can a Black hat hacker get in trouble?

Depending on what he does.
If he knows what he's doing is wrong, and yet still persists, then yes.
If he's not doing anything wrong, or Black-Hat-in-Name-Only then he most probably won't.
Or if he doesn't realise what he's doing is against the law, he might be aquitted.

-But for your own personal interests, DON'T BE A BLACK HAT. They are most widely, and most commonly blamed for EVERYTHING, from glitches in software, computer hijacking, to computer crashes.

What is GTMHH?

guide to mostly harmless hacking

a BS guide to "hacking" your win95 logon password and other such rubbish

What are the three phases a computer hacker goes through prior to attacking their victim?

What are the three phases a hacker goes through prior to attacking their victim?

a. Footprinting, scanning, and enumeration

b. Footprinting, searching, and enumeration

c. Footprinting, scanning, and evaluation

d. Footprinting, scanning, and engineering

How do you do net hacking?

hey i recomend u not trying this you can really stuff up some ones PC so as ur own

so i wouldnet consider it

What is the best learn to type program?

I have tried several touch typing programs, and I have to say that the best option is both free of charge and online. It is located at www.sense-lang.org/typing and supports several keyboard layouts from several countries. The only thing you need to use this is a flash player.

Even though the program has a set of several tutorials based on random text (ff, jj, fj, jf etc.), the main emphasis of the site is on pasting your own text and practicing with that. This is best, as most people remember much better when they are practicing with real text than when with random text.

When you are learning to touch type, you should consider the Dvorak Simplified Layout, which is a better alternative to the QWERTY-design, which is quite outdated. What the layout has to offer is:

# It is easier to learn (even when you have used a QWERTY-keyboard for several decades)

# Greater speed (research done in the navy shows that the amount of time used to learn to type on the keyboard is regained when you have used it for ten days) # Better ergonomy (people who use Dvorak are less likely to get sicknesses in their hands and arms as the keyboard layout has been better designed.)

Read all about it at: http://en.wikipedia.org/wiki/Dvorak_simplified_keyboard, and several other computers. All major operating systems have a US-English Dvorak layout built-in, and you can easily install one for your language, or even make it yourself. A guide to switching is available at: http://doomtech.net/wiki/index.php/Dvorak_Simplified_Keyboard

When learning, try to do your best NOT to look at the keyboard, and try to touch type as often as you can, even when not practicing (chatting, writing etc.) I typed for two months, and my typing speed doubled!

How do you spike someone who is hacking your computer?

Although it may be possible to "spike" a hacker there are programs that allow you to perform an IP Tracer which can be found at http://download.visualware.com/internetsecurity/index.html

But it is far better to inform athorities of the Hacking IP address inwhich the hacker will be delt with accordingly.

To "spike" them and cause damage means you are no better than the hacker and can ultimatly get you in trouble or if the serge is too great you may cause harm to the user. In Australia tough new penalities being considered for computer hackers where New Federal laws are being developed to stiffen the penalties for computer hacking and other forms of cybercrime.

The new bill would lift the maximum penalty for computer crime to 10 years
jail.
http://www.australianlawonline.gov.au/accesspoint?action=menuHome

What is the best hacker book to learn about cybersecurity and ethical hacking techniques?

One of the best hacker books to learn about cybersecurity and ethical hacking techniques is "The Hacker Playbook" by Peter Kim.