answersLogoWhite

0

White Hat Computer Hacking

Questions concerning 'Ethical Hacking' curriculums such as that found in any of the official ethical hacking courses may be asked here.

298 Questions

Who are the goons that attend defcon?

The goons- British radio comedy programme that was produced by BBC home service from 1951-1960.

Can a good hacker gain personal information from an IP Address that was obtained from a sent eMail Info including exact home address SSN phone number phone serial number full name is that possible?

The vast majority of IP addresses are assigned dynamically and can potentially change for a user on every use. This makes the thing you are asking about almost impossible.

A few IP addresses are assigned statically and never change. There are records of who these IP addresses are assigned to and so some of that information could be easily found by the hacker.

However for either dynamic or static IP addresses there is no single database or even paper records source that one could go to to find all of the information mentioned.

How do Hackers Hack a Computer?

Hackers hack computers by using viruses or coding that enables them to get onto your network and access files.

How is e2labs for ethical hacking?

E2Labs Top 100 Private companies in Asia (RED-HERRING United States), Asia's 1st Anti Hacking Academy based at Hyderabad. Since 2003 we have been imparting Awareness, Training and Corporate programs to Several Verticals across the Country and international Clients as well.

Have won several Awards and Accolades across the Globe and in India to name a few are Top 100 Companies of Asia-RED HERRING-U.S.A, TIECON Silicon Valley U.S.A, W.I.P.O- United Nations, and several National Awards and State level Awards to our credit. The recent were Educational Excellence Award @ Indo-Global Educational Summit2010 by Union HRD Minister & Best Speaker Award @ Technology Sabha (The Express Group) January 2011.

They have Trained Corporate employees of Google, Microsoft, Yahoo, Genpact, National Police Academy, Deloitte, Mercedes-Benz, Dell, Indian Armed Forces & Defence, Air Liquide, Forensic Science Labs, Intelligence Department, Several Government and Law Enforcement Agencies.

They are offering several Training programs from 3 days to 1 year, and have designed 3 new programs for collaborations 1) Masters in Information Security 2) Bachelor's in Cyber Security 3) Drop-Out Digital License Program they all are designed by reputed and experienced Information Security Czar's, Veterans and Specialists.

As per NASSCOM Survey report India requires 200,000 Information Security Specialist as the supply is just 18,000. We will also provide students with courses that can offer them training and job guarantee after their training completion.

They are coming up with new batches and good discount packages for the students who have attended our awareness programme conducted in their colleges.

Hope, you will provide us an opportunity to introduce us to a jubilant and promising Career. Awaiting your response on the next steps.

Do visit our Academy and R&D Center at Banjara hills, If you have any questions at all about E2labs for any of our Career oriented Information Security Programs, Awareness or technology transfers feel free to contact us.

e2labs has Indias most advanced lab with latest equipment and have world class infrastructure.

all students have RFID tags for entry in to different labs

E2labs have developed a world class Game Zome for all students

How do you hack smoothwall?

1) Start

2) Run

3) Cmd or Command Prompt

4) Type ipconfig /all

5) Write down Default Gateway (i.p. for Smoothwall)

6) Inject packets of information into it, or block it with an I.P. blocker

What is software hacking?

software hacking where you hack a game ,website or even a computer, to download this software, they could be a scam most of the time they are, but still i would take my chances that is how brave i am.

Is hacking good?

Hacking is not just illegal, but cracking is. There is a general misconception that a hacker is a bad guy. A hacker is a computer guru, passionate, etc, that understand how system work. They do nothing illegal. However, a cracker is someone that uses computer skills to do illegal stuff. That is cracking, which is bad.

What buttons do you push on a computer to hack?

It depends on what you are trying to hack, ex: if you are trying to hack into the Administrators account then while the computer is booting up ( immedietly when you turn it on write when you press the power button) Hold F8 the button not buttons(f, and 8).

The geographical features of Antarctica?

i dont know all of them but four are ice shelfs ice berg pack ice and glaciers hopefully this was helpfull i need this info to for an assignment :)

laaurennn

Excessive computerization is stealing jobs from the people?

I agree, computerization will lessen the use of human labor.

My team & I offer the best hacking services.We can hack/recover any email id,mobile

phone,FACEBOOK & website servers & grant our clients access..We always provide proof before payment so you know you are not being ripped off.Send me a mail "zilchex@gmx.com".We try to reply every client ASAP & execute the project in the quickest time-frame possible.

#Patience is the first weapon!#

My team & I offer the best hacking services.We can hack/recover any email id,mobile

phone,FACEBOOK & website servers & grant our clients access..We always provide proof before payment so you know you are not being ripped off.Send me a mail "zilchex@gmx.com".We try to reply every client ASAP & execute the project in the quickest time-frame possible.

#Patience is the first weapon!#

How do you get a Windows XP password from a password hash?

There are several tools that will determine the password from the hash. You can find them via any Internet search engine.

Does imvu hack your computer?

It is a fairly well known program, so it is very unlikely.

Who is the best ethical hacker in India?

Benild Joseph the 22 years old world renowned Ethical Hacker | Information Security Consultant | Speaker | Author in Indian IT Industry was born in Calicut, A City of Kerala. Currently Acting as the Chief Executive Officer of "Th3 art of h@ckin9" - International IT Security Project. He has his credit to many registered and pending patents in cyber forensic and information security domain. He specializes in Web Application security, Penetration testing and Forensic investigation. His research interests include Computer Security, Networking, Data Forensic, Virtualization, Web Application Vulnerability and Information Security. He has been interviewed by several print and online newspapers where he has shared his experiences relating to Ethical Hacking, Scope in Indian Information Security field, Cyber War and Cyber Crimes.

How do you hack a college computer system?

Depends on what you mean by "hack" and different colleges would have different security levels and features

Difference between Hacking and Passing off?

A hacker is a person who is proficient with computers and/or programming to an elite level where they know all of the in's and out's of a system. Hacking is the pursuit of knowledge through exploration. Passing off is a common law concept. It refers to the misrepresentation of the goods or services one is offering as coming from another party. This false impression is created through use of another provider's recognizable trademark, either by the production of an identical copy, or a closely comparable mark.

What hackers do after hacking?

It depends on... Usually after hacking the system, hackers escalate rights on the system, then open backdoors (by installing "illegal" software) to make possible to use the system again. And the last step hackers hide its presence by deleting or modifying log files.

How do you prove you are not a hacker?

It's very tricky, the main point is to show that you did not do anything illegal.

Who hacked the Pentagon?

I do not believe that the Pentagon has been hacked yet but there was security breaches.

Gary Mckinnon

What are the types of hackers?

there r four types of hackers .




white hat hackers :- they do hacking only for ethics they trace and monitor the malicious activity.they have the legal rights to do hack or related to hacking . they are also called ethical hackers.



Black hat hackers :- they do only malicious thing like making trojens ,hacking email id .they actually called crackers . they don't have the legal rights to do that. they are called non ethical hackers.


grey hat hackers :-some time white hat hackers turn to black hat hackers those hackers are called grey hat hackers.


suicide hackers :- that type of hackers do the illegal job without fear of police or law.






for more practical knowledge regarding to ETHICAL HACKINGsubscribe the channel:
http://labs.google.co.in/smschannels/subscribe/ethicalhackingTricks

How do you unlock a CD-R?

CD-R are read only. Double-click it to open it and copy them in to a new folder then eject the CD. Go to your Disk Utlitity and create a new one then double click on the disk image to open it then drag the contents of the folder in to the image window then eject the image.

How do i hack wizard101 with nothing but a computer?

You have to send an email to wizard101unoffical@yahoo.com and this is wat you say this as the subject /ROOT/Bin/Data/Wizard101/Code !Command=Enter* 1% /Source-code/ and then in the body $query = "SELECT name FROM member WHERE name = '$username(Your username) (AND Your pword) = PASSWORD('$pword');"; hashed = md5($pword1);$query = "INSERT INTO member VALUES 60

this makes you a full meber and level 60 with unlimted crowns it does take about 7hrs to 14hrs

yea this is a lie, this person will steal your account

Who is coded32?

He is a famous Internet Hacker. Hacked into IBM, Microsoft Russia, and his domain was www.coded32.net.tc

another domain was www.coded32.com

I dunno wat happened to them, but they were there.