answersLogoWhite

0

White Hat Computer Hacking

Questions concerning 'Ethical Hacking' curriculums such as that found in any of the official ethical hacking courses may be asked here.

298 Questions

How do you take control of someones computer?

wel i will tel you a story when i was on holiday in Spain which might help you i came into a computer cafe and saw someone on one of the computers she was on windows live messenger and her mother came in and told

her to come off she came off and still had 5 mins left before her time was up and she did not sigh out of her account so that basicly means i cud talk to her mates while tey not knowing a thing

What is hocking?

Do you mean HACKING? The term has a lot of uses. Hackers can be just people that like and know a lot about computers and technology or they are people that can seriously damage computers or make viruses. They could even steal information. (also called crackers).

Hacks don't always mean computers. This morning on youtube I learned how to hack a lighter. Look it up on youtube!

Why don't people understand that hackers are not bad people?

Opinion

Hackers are dangerous and the cause of one of the worst things in America, identity theft. A hacker could destroy lives.

Opinion

Hackers have developed an array of levels of hacking ranging from good hackers to bad hackers. However, a hacker historically is one who searches out and exploits weaknesses in computer systems in order to gain unauthorized access. Some do this simply because they can and breaking into a system is a source of pride for most. Computer hackers typically steal and damage property that doesn't belong to them. Placing all labels and semantics aside, in a civilized society governed by laws that protect its citizens, people who steal are considered "bad" as they should be. Hackers are modern day pirates.

What does hacking do?

Hacking is basically the vast knowledge of computers or any particular thing. For a computer hacker you should have vast knowledge of computer or in other words you must know everything about everything.

There are different types of hackers and the work they do depends on their category.

Ethical Hacker or White Hat Hackers do only ethical hacking like securing computers from malicious viruses and activity. They trace the path of the virus and other things.

Black Hat Hackers do only non ethical things or malicious things for harming the computer like hacking email accounts, sending Trojans, stealing, and lots of illegal things related to computers.

Kinds of hacking?

That depends on your definition of hacking. But usually anything can be hacked from computers, networks, servers, websites, phones, coca cola machines, apparantly they have figured out how to hack coffee machines...

Can a hacker hack anything if someone is online?

Yes the hacker can hack a lot of things.

peoples account,video games,coins,gold,etc

as if you know hackers are really smart especially those hackers who make their own program some hackers hack for good things. some hackers hacks for revenge wich is kind of good or bad. why does hackers hack video games?

its because they want to buy stuff they REALLY want so they learn how to hack and make theyre own program to hack coins and then buy the stuff they love.

What are the functions of white hat hacker?

"White hat describes a hacker who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system's owners to fix the breach before it is can be taken advantage by others (such as black hat hackers.) Methods of telling the owners about it range from a simple phone call through sending an e-mail note to a Webmaster or administrator all the way to leaving an electronic "calling card" in the system that makes it obvious that security has been breached. While white hat hacking is a hobby for some, others provide their services for a fee. Thus, a white hat hacker may work as a consultant or be a permanent employee on a company's payroll. A good many white hat hackers are former black hat hackers. The term comes from old Western movies, where hero's often wore white hats and the "bad guys" wore black hats." Answer from SearchSecurity.com

Is it easy for people to steal someone else's passwords?

The ease or difficulty depends almost entirely on two factors: (1) the ease with which the server containing the relevant passwords can be hacked, i.e. if you want Jane's Amazon password, this metric would concern the difficulty of hacking into Amazon, and (2) the ease with which the individual computer where the password is used can be breached, i.e. access to Jane's computer. The third most important factor, but it is distant, is the simplicity of the password. Passwords like bu6iFL5apgt70pXa are much harder to crack than 123456.

However, hacking is a crime in almost every country and should not be performed. This answer is only to demonstrate the ease or difficulty of performing such an activity.

Effects of piracy?

Some of the effects of piracy is:1. Decrease in the Sales of legal copies.

2. Retail Price Effects of piracy: Street prices are affected by the extent of illegal commercial copying. The availability of inexpensive, high-quality illegal copies reduces the demand for legal copies to the extent that some users buy illegal copies instead of legal ones.

3. A report states that in June of 1996, the largest ever video piracy operation in the United States was dismantled in New York. The nationwide counterfeit business sold more than 100,000 pirated videos a week, grossing approximately $500,000. The investigation, dubbed "Operation Copy Cat", culminated when search warrants were executed by the New York City Police Department, assisted by the MPAA, on 17 locations, including four labs. Authority arrested 36 people and seized 817 VCRs, 77,641 pirated videos, $40,000 in case, 37,000 blank cassettes, more than 100,000 sleeves, lables and other sophisticated equipment used in the duplicating process. The economic impact on MPAA member companies is estimated to be more than $87 million a year.

Legal implications of hacking into a computer?

Men are in prison for hacking into a computer. They do not like prison. They would like to correspond with people in the outside world. They feel isolated, lonely, trapped, alone. They wonder how they got in a place with all those thugs.

Can you say that the hackers are the good people and crackers are the bad people?

For all intents and purposes, there are indeed good and bad hackers when considering all the modern definitions of hackers, but the answer one would get to this question depends on whom you ask. In general, there are four categories of hackers. Each category attempts to generally convey the moral compass of that group relative to themselves and everyone else, as well as provide a basic backdrop of information on that category.

The first category of hackers are those for whom the term 'hacking' was originally defined. In this category, you have the hackers that perform the art in order to improve their knowledge of technology. They are curious about how systems work, and all of their attempts at penetration and exploits are merely expressions of this curiosity. Any damage caused is coincidental, or, if intentional, is based on revenge and not simple exploitation of innocent bystanders. Hackers were often classified by types, such as hardware hackers, computer hackers, phone hackers, etc.


In general, this category of hackers will not acknowledge the remaining three types of hackers as such. They consider the second form of hackers to be 'crackers', the third form as 'security consultants', and the fourth form as 'criminals.' This category only recognizes the classic definition of hacking, and so all hacking is good. Most everyone else, except possibly whitehats, are likely to see this category as bad due to the negative media coverage of crackers.


The second category of hackers were called crackers at large, until the media had a confusion over the various terms and simply lumped anyone that did something unusual with technology as hackers, mutating the term. Crackers are those that generally 'crack' things, such as breaking through firewalls, reverse engineering copyright protection so they can sell illegal copies, and the like; they have the same basic skills as hackers, but have a darker side to their motives.


Classic hackers generally hated the media for smearing their reputation by lumping in these malicious individuals with themselves. At some point, crackers also started using the term 'hackers' for themselves, thus further cementing the definition of hacker as 'one who does bad things with computers.' These crackers see themselves as good, or at least morally gray, and do not generally see any difference between their activities as compared to classic hackers, but are classified as bad by almost everyone else.


The third category of hackers are called whitehat hackers. Individuals in this category are a branch from the classic hackers on the 'good' side of morality. While classic hackers might say that this new group of hackers sold out on their heritage, whitehat hackers are out to make the world a better place, and line their pockets at the same time. Whitehats generally appeared after the appearance of blackhats; they seem to have appeared from the classic hacker community in response to a threat with the promise of monetary gain for their troubles.


These hackers will penetrate systems, document the flaws, and then sell this information to the organizations they have penetrated. They won't generally do so until they've been contracted by the organization to perform this work, which makes their otherwise illegal activities legal. They are essentially employed hackers for the good of humanity. Classic hackers are likely to see them as bad, having discarded their disdain for corporate greed, and blackhats see them as enemies, while the rest of the world see them as good.


The fourth category of hackers are called blackhat hackers, and represent the other side of the for-profit hacker community. They are generally crackers that have gone to the next level of the art of criminal activity. While crackers might break copyright protections for personal gain, blackhats are more interested in the big pot of gold at the end of the rainbow. Rather than sell a few lousy DVDs or cracked games, these hackers break into databases and steal millions of credit card numbers, or grab bank account numbers and transfer money out of them covertly, and other such activities.


Blackhats and whitehats are directly opposed to each other, with the good trying to defend companies against the bad. Neither group are generally interested in hackers or crackers, except possibly as recruits for their respective trades. Everyone considers this group bad, except for themselves; since most of them have little sense of morality, they usually simply exist, although some might acknowledge they are bad or have a sense of doing good by claiming that their hacker mentality against corporate greed drove them to relieve those corporations of their money. Blackhats, however, will work together for greater gains from their activities.


As one can tell, 'good' and 'bad' are relative to whom the question is asked, and even their very definitions differ even within the same group and from other groups.

How can computer hacking be dangerous?

Well multiple reasons. You could be reversed hacked. The victum might have a virus on theirs that sends itslelf to you, and if you are doing it illegaly then you could get cought by the feds from your IP. (google IP address trace)

How do you protect your system from hackers?

They usually have high levels of complex neural networking systems and firewalls set up around their information databases to detect any abnormal activity, such as hacking or unauthorized persons attempting to access classified data. They also have hired persons that are trained to handle hacking and tracking situations.

What is the concept of hacking?

Hacking is the practice of understanding the workings of a system. Hackers do not Break into systems, do anything illegal, or unlawful. Hackers are intelligent people who do not abuse privileges or discoveries. If you are trying to break into a system or something, You are committing a crime. This is called cracking. Cracking is ILLEGAL. Cracking is also unlawful and should be avoided.

What is a criminal hacker?

Originally the term referred to people who used a razor blade and/or fingernail clippers to "hack" or roughly cut parts in electronics such as the traces on circuit boards, legs of diodes etc. Police scanners were "hacked" in order to add more memory, remove CPU processors , speed up scanning by "hacking" the crystal oscillator and replacing with faster ones. Thes methods are directly related to why computers now have more RAM, and are faster. Some of the old (and I do mean old) "hackers" devised a system in the 1960s to simultaneously send voice and data over a phone line using frequency phase shifting and filtering. A similar process used later by DSL.

"Hacking" and "Modding" evolved into things such as examining the programming of a thing. Beginning with noticing things such that by pressing certain keys or combinations of keys in certain secquences on a device could produce certain results. Following the era of IBM's "Big Blue" chess tournament, AT&T introduced the "unbeatable Tic Tac Toe Computer, and exhibited it. I, I mean a "hacker" back then, was able to beat the computer with a sequence of key presses in order to "cheat" the computer out of a move. On many Shortwave radios, Police Scanners, even cell phones etc, certain key presses are used in the programming, and could be used to alter that programming.

The keys on a keyboard of a device are a "Matrix" Keyboards use a matrix with the rows and columns made up of wires. Each key acts like a switch. When a key is pressed, a column wire makes contact with a row wire and completes a circuit. The keyboard controller detects this closed circuit and registers it as a key press to the software.

I'm going to try to keep this understandable to readers ...

Software can emulate or act like hardware.

Example: a hardware modem versus a DSP/Digital Signal Processor modem, where a chip is programmed to act like the hardware....

So, later, the focus turned even more from "hacking" the actual electronics and hardware to software "hacking" through PROGRAMMING.

A "black hat" hacker is often referred to as a microcomputer user who attempts to gain unauthorized access to proprietary computer systems. Although that could be a "cracker" ... a person cracking passwords etc.

Most often people who call themselves "hackers" are called "wannabes" by the old-timers, and nowadays are often adolescents using a program they didn't write, by clicking a button they didn't create, to do what don't understand, in an attempt to disrupt something they don't know how to fix.

"White Hat" hackers are the "good guys" like ... Like the old-timers who vastly improved what computers are capable of doing, and the ones currently trying to improve security by locating and preventing weaknesses.

This Answer is dedicated to the memory of Bill Cheek, author, The Scanner Modification Handbook series, and his BBS and Fidonet terminal (prior to "The Internet") Good man, Good freind to many... May he R.I.P.

Advantages of ethical hacking?

Since security is week in all technical fields... ethical hackers are brought into work for the corporate sectors with high wages... All ethical hackers have a great scope in nearly future.. if you have any disagreement in my idea about ethical hackers you can mail your concepts to "pown.raj77@gmail.com" For futher informations about ethical hacking you can contact me through my mail id..

How can you find out a hacker?

Often more than not the term, "hacker" is used to describe someone that uses computers to break computers or deploy attacks on computer systems. The correct term is "cracker".

A hacker is a person that always asks themselves how something works and then figures it out.

To become a hacker you have to find a project where technology does not exist to make things work the way you want them to then use your smarts to find an answer.

Hacker = Inventor of things on top of things already invented.

or else you can say a solutionfinder for silly solutions t

Difference between ethical hacking and security testing?

According to the EC-Council's Certified Ethical Hacker course documentation the two can be defined as follows; Penetration Testing:

A goal-oriented project of which the goal is the trophy and includes gaining privileged access by pre-conditional means.Ethical Hacking:

A penetration test of which the goal is to discover trophies throughout the network within the predetermined project time limit. For me reading that I would say difference is; a pen-test has a single goal (trophy) and strict procedures that have to be followed to get that trophy, and an ethical hack is a much larger beast that involves many goals or trophies, could last so long it needs to be time restricted, and in general has less limits. So a pen-test is "one goal, one process" and ethical hacking is "hack everything that can be hacked... ...ethically"

How do hackers find you?

Hackers search computers and/or networks for weaknesses. Hackers that exploit these weaknesses are called Black Hats. The ones who try to fix this weaknesses are called White Hats. Grey Hats are both, usually they're White Hat Hackers by day, and Black Hats by night.

How can you stop the Hacker?

If a hacker has gotten into your computer once, they will get in again. If you are unable to track down any programs that they left behind, you should seek professional help. As a last resort, backing up your important data and reformatting your computer will guarantee removal of these programs.

Remember to always use strong passwords and to be suspicious of any programs you download from the internet.

Why did hacking start?

Hacking started because people realized that there were flaws with security. For example, this month people realized there was a major security flaw with internet explorer 7. Savy PC user knew they could access otheres information without them knowing. Hacking also started because user were concerned about vullnerabilities.

Is wanting to become a computer hacker bad?

It depends on what you mean by hacker.

Being a true hacker is someone who knows lots about a particular technology and is good at modifying it to make it better. Whether hacking is a good or bad thing depend on what you hack. If you hack some thing with a copyright or cause destruction then yes it is bad. If you use those skills to improve open source software, do legal penetration testing, digitalize a toaster, build your own chat program, ect. then hacking is a good, legal, and fun hobby or possibly even a profession.

Are there any cheats for ponybox?

You can cheat by getting a page refresher and logging on and letting it run for a long time. And then you can collect the items using the in-game item "item retrievers" These items can be slightly exspensive, but for large items that you can get via this method, it can be worth it.