Showing posts with label Hackers. Show all posts
Showing posts with label Hackers. Show all posts

Wednesday, 5 November 2014

12 Simple Steps To Become A Hacker

Steps to become a hacker
Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look

1. Learn UNIX/LINUX

linux operating system
UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.


2. Code in C language 

c programming
C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970�s. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language

programming languages

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

4. Learn Networking Concepts

computer networking
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

5. Learn More Than One Operating Systems 

operating system
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography

cryptography encryption
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking

hacking or hackers
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

8. Experiment A Lot

experiment
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)

hacking vulnerability

Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.


10. Contribute To Open Source Security Projects

open source software
An open source computer security project helps you a lot in polishing and testing your hacking skills. It�s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 

learning hacking
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 

discussion
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.

About Guest Blogger
Sifat Ullah is the founder of Uthweb. At UthWeb he writes about Tips & Tricks, Apps Review, Information Security, Ethical Hacking Guide and all that stuffs related to technology
Read more...

Friday, 14 February 2014

Fraudsters Shall Not Pass - Simple Advices On How To Avoid Scammers In Social Networks

Advices On  Avoiding Scammers In Social Networks

Social networks are always great for communicative people; they make you closer to your friends, relatives and hackers. Social networks are very attractive for such kind of people. You can ask me: �Why do they need that?� All they need is your account. The fraud schemes may be different. But the main aim of them is money. They can ask your relatives for help, especially when you�re far away. Why shouldn�t they believe their own child, when he needs money?

Fraudsters do not disdain playing on the heartstrings. They can write everything, that there�s an accident, you�re in a hospital, etc. So today we�ll study to confront fraudsters and keep our nerves and money safe.

Consequences

social media hacking scams
The most people don�t think about possible risks when creating their profile on social networks. The more personal and professional information you give, the easier it is for fraudsters to rob you. Let us discuss the easiest scheme. Some criminals are simply searching for people living in the same city to plunder their houses. Why does it happen? Different people are writing perfect information, like �We�re going to visit California next weekends. Hoping it�ll be great� Of course it will be great. For the robber, because now he knows that the house will be empty during weekends and it�s the perfect opportunity for him.

The second thing is the photos. When you�re downloading images and photos on social networks not only your friends like them. It�s also the perfect resource for burglars. From home-made photos, they can receive information about your welfare and house structure. When you have a dog, the robber will be prepared, because everyone has photos with their home pets. That�s why we earnestly advise you not to put in the Internet photos of your house, and some things that can attract robbers, for instance your new car or a brilliant ring.

Advice

The next our advice � create a complicated password. We�ve just discussed what fraudsters can do with the access to your account, so try to protect yourself, your friends, and relatives as good as you can. Don�t make a password consisting of just your birth date. Remember, that it�s the first combination fraudsters try. Also, don�t put your birth date as the answer to the test question if it�s mail. Check out below article on password cracking.
Let us imagine that you have a complicated password, you don�t download the �rob-attractive� photos and one day you receive the link from your friend where he asks you to vote for him. Stop now. This can be a trap. If you�ll link, the fraudsters receive your personal data, such as login and password. Such scheme is called �fishing�. So, in this case, ask your friend something personal. The other variant is just to make him a call and ask about this. If you�ll receive the answer like �What are you talking about?� you should explain him that he was hacked and offer to change the password. Check out below tutorial to know about popular hacking method used to acquire sensitive information about oneself.
Phones are really helpful things. Explain to your friends and relatives that you can be hacked and if they receive messages with money requests, they must call you at first and ask about that. Remember that your security is in your hands and be careful.

Melisa Marzett is the professional blog-writer. Her works are presented at Essay Review. She�s interested in computers and different computer software. If you want to ask Melisa about something, write at
Read more...

Wednesday, 5 February 2014

Hacking Someone's Facebook Password Using Some Software Or Website? No Sir You Can't!

facebook hacking
Do you know there are over thousands of websites and software that claim to hack Facebook password of any account? They'd ask you the victim's profile ID, maybe your credentials and some money too and will reportedly tell you the password which, to be honest, never works. Ever wonder why? Let me tell you why, they're FAKE! They're a scam which tricks you somehow in losing your money or your own Facebook account. Just give it a thought, why would Zuckerberg and his team spend Billions of Dollars on Facebook if one could hack it in less than a minute? Today, we'll take a look at this topic in detail with some example websites and software and get answers to some common related questions.

Back in 2005, I came across a mechanism that reportedly hacked Yahoo mail password for a user using some simple tricks. It didn't work for me for obvious reasons but I didn't stop believing the possibility until I grew up to realize how helpless I am here. One of the major concerns of large organizations like Facebook and Yahoo is security because of the super sensitive information about people they have. Several hundred million dollars are spend yearly by these organizations to ensure security and then there's these websites that claim to undo all that protection in less than a minute.

The Facebook password cracking Websites and Software

Let's start with some examples here. I googled the subject and picked the top results without order. Didn't care to search harder because there are thousands such and I know that all are FAKE.

So let's look at this GETFBHACK.com.
hacking facebook password
Their FREE Facebook hacker program is said to be capable of cracking the password of any Facebook user within a day. Sounds cool, I could try it out, but my Norton Antivirus rejected the file straight away.

I also picked up another one. This Hack-Fbook-Password asks me to enter the profile ID of a user and it will crack the password. I said Okay and began the process.
facebook hacking
It ran certain algorithms to determine the password and finally landed me on a page that said I could DOWNLOAD the password IF I fill an online survey first. Those of you who've been redirected to surveys would know they don't work and are put just so to get traffic and earn money.

I said maybe I should leave the website now but hey, they gave me a prize!
hacking facebook

So I just became the luckiest person in my city just like that!

Now tell me, how can a sane person believe in all this?

The truth!

Let me get this straight to you, these websites do nothing at all just waste your time and are never able to do the job. In fact, downloaded programs just make the situation worse when you run them. I had my Norton Antivirus to guard me otherwise I could be in severe danger currently.

These software are mostly keyloggers and tracking programs that record your keystrokes and action and steal personal information from your computer in the background and send it to their master servers. So ultimately a hacker wannabe gets hacked, how ironic!

From now on in the post, I'll be using the word 'Hacker' for these websites and software since you're no more in the position to be called that.

Why do these 'Hackers' do all that?

facebook hack
Setting up websites, maintaining them and developing software is not an easy task. It requires some money. So why do these 'hackers' do all the hassle? It's because they get equivalent or more money in return. They can extract your credit card details and other banking info from your system and use it for their advantage. They can hack your account and use it for wrong purposes. Give me one reason why one wouldn't steal money and hack accounts for no loss.

Why people fall in their webs?

facebook hack
Why do people try to use such unreal hacking procedures? It's because it's unreal to me, it's unreal to you but not to those who are not much familiar with the working of a software. They get in the web of these hackers and eventually get screwed up pretty bad without consent.

The websites give guarantees and also portray their 'imaginary' happy customers so as to trick a reader. Such tactics are simple but really powerful and serves to their advantage in most cases. This is also why there are thousands of such websites available.

So is Facebook account an 'unbreakable fortress'?

facebook hacking
Well, NO. Facebook accounts can be hacked. No online service is foolproof and that is because of the flaws and bugs in their software. There are several ACTUAL hackers in the world who can analyse a website's security and use that against it thus making hacking a reality.

But I'm 100% sure none of them uses these scam and fake websites that claim to do the impossible. You can check out our hacking section to know more.

I'll end the 'lesson' with an idiom, "look before you leap". Focus, think and then follow. In case of any queries or confusions head over to the comments section. Cheers :)
Read more...

Tuesday, 28 January 2014

Hackers Outside Hollywood - How Hacking Really Began?

Hackers Outside Hollywood
Before Hollywood took the hacking phenomena under its wing, unless you were a clued-in techy, the world of hacking would be unfamiliar territory. In recent years, movies like The Girl with the Dragon Tattoo, The Matrix and The Italian Job have managed to glamourize the high-tech thrill of breaking into servers, cracking door codes and hijacking security networks.
But before television brought the hacker technology into our general knowing, hacking was still an occurring reality for some. So what is the history of hacking and where did today's sophisticated hacking begin?

Late 1950s � The MIT Start Off with a Bang

Hacking wasn�t always about computers. In fact, the first �hackers� were roof and tunnel hackers, which the Massachusetts Institute of Technology was instrumental in introducing. These were people who entered roof and utility tunnel spaces without authorization, in other words getting into a place they shouldn�t be in � which is where computer hacking got its name when people started using technology to get into data systems they shouldn�t have access to!
Roof and tunnel hacking was initially intended as practical jokes and saw the hanging of banners from tall places and the popular placing of a model car on the top of a university building. Unsecured entry points would be used to gain access and cause mischief as per the desire of the hacker.

Early 1970s � The Era of Phone Phreaking

phone phreaking
The telephone network was the first technological victim of hacking know as Phone Phreaking. It was ingeniously discovered that whistling down a phone in a specific tone could in fact force a switchboard to allow calls. The exploitation of telecommunications systems using audio frequencies was further enhanced by the use of tone-generating devices to permit even free long-distance calls.
Phone Phreaks� were committed to gaining unauthorized access to telephone systems, which quickly saw the evasion become a criminal offence.

Mid 1970s � A New Level of Virus Sophistication is Met

In 1975, several Motorola staff unearthed a way to crack the security system on the Xerox machine using a simple programming strategy. They reported the problems as a matter of urgency to Xerox but when no action was taken to resolve the loophole, Motorola staff mischievously installed programs named Robin Hood and Friar Tuck.
These programs were designed to cause mischief in the system such as printing insulting messages to each other or making huge old disk drives �walk� across the floor, and the programs prevented the system operator from aborting them by protecting each other and persistently reappearing after rebooting of the system.

2007 � The Return of Urban Exploration

The 1950s exploration of physical spaces returned with Parkour and free-running as a more creative mode of accessing abandoned and forbidden places. Parkour involves running, jumping, swinging and vaulting over obstacles in the hope of trespassing � all in the name of creativity and freedom, and all, technically, a form of �hacking�.

The Present Day � 'Information wants to be free'

free information hacking
Technology activists and the availability of free online schools has encouraged the illicit access of information. Online schools such as Udacity, Codecademy and Khan Academy have provided people with the tools required for coding and have led to an increase in the number of code-literate individuals. With a booming number of techies, breach of online security systems has also proportionally risen.

It seems that with the advancements in technology and the evolving of hacking with time, we can anticipate a nightmare future of computer hacking. Prevailing hackers are likely to turn their attention to governmental projects and entering mainstream security systems by clever impersonation. Computer coding has become child's play for many and it is anticipated for budding hackers to seek opportunities to enter the world of biohacking, where even the software of life and our DNA itself remains unsafe!

What do you think will be next in the world of hacking?

About Guest Author
Gregg Townsend is passionate about everything from gadgets to web-design and likes to keep up to date with the latest news regarding hacking. Connect with him here on Twitter.
Read more...

Thursday, 9 January 2014

Top 6 White Hat Hackers In The World

Top 6 white hat hackers
Let� begin with who is a white hacker? First of all, white hacker is good, conscientious and ethical hacker, who tries to save the balance of the universe by doing good works. White hats are very useful and it goes without saying they constantly compete with black hats. White hats hackers can be compared with cats, which catch mice, namely they look for defects of the systems. Besides, white hats are computer security guards, they test systems for the level of protection and moreover they improve their skills. Mainly, white hats don�t look for fame or money, they serve in society.
It is undeniable that sometimes black hat hackers became white hackers and prevent crimes, because they perfectly know what to do. So who are they main and most famous white hats of all times?

Before you move on further with this post you might like to read about Top 6 Black Hat Hackers.

1. Stephen Wozniak

Stephen Wozniak white hat hacker
Stephen Wozniak, The Great Woz, as many hackers call him, moreover,  he is �the second half� of Steve Jobs and Apple empire, became as an icon and inspiration for many people, who never lost interest in computer technology. What did he actually do? It is well-known today that he made free long-distance calls possible exploring so-called blue boxes, at the time, when high technology has made its first baby steps.  Nevertheless, one should accept that Woz is an independent developer and worked for the good of people. Currently, Stephen Wozniak is preaching charity and provides new technologies. One can truly say that Stephen Wozniak made a difference in this world and he deserves to be called as a white hat hacker.

2. Tim Berners-Lee 

Tim Berners-Lee white hat hacker
Tim Berners-Lee is well-known around the world as fonder of the web we use - World Wide Web. No wonder that this man invented his first computer using iron, as they say necessity is the mother of invention. Doubtless, his innovating had led him to becoming a president of the Open Data Institute in 2012.

3. Linus  Torvals 

Linus Torvals white hat hacker
Linus  Torvals created Linux operation system, which many of us use. At the beginning, this system was about to be called as Freax, using the combination of words � freak� and �free�. Luckily, nowadays we know it as Linux.  As Linus himself once said that all he wanted to have fun doing something he really enjoys. This seems to confirm the idea that it is the great result of having fun!

4. Tsutomu Shimomura 

Tsutomu Shimomura  white hat hacker
Tsutomu Shimomura is also a very good example of a white hat hacker. The bottom line is he tracked down another hacker � Kevin Mitnick, who actually was a black hat hacker. However, later on he has entered the ranks of white hats. Tsutomu Shimomura caught Mitnick with flying colors hacking Mitnick�s phone. Good job catching �black knight�. Currently Shimomura is CEO and CTO of Neofocal System.

5. Richard Matthew Stallman 

Richard Matthew Stallman white hat hacker
Richard Matthew Stallman is known also by his initials � RMS. His policy is to give users freedom of usage software as well as education, freedom of voice and choice. He has developed Free software foundation, GNU project, which allows use computer and its devices for free
What is more, RMS is a founder of copyright concept. Among the list if his merits are 14 doctorates and professorships.

6. Johanna Rutkowska.

Johanna Rutkowska white hat hacker
When it goes about technology and computers, most of the time we mentioned men. Women weren�t pathfinders in this area, however, they have done enough to be mentioned among outstanding white hats. Thus, this smart lady could hide root kits in software and hardware and to make them invisible to a naked eye. One must admit the talent of he woman. To draw the conclusion, one can say that enumerated people have brought its own contribution in foundation and innovation of computer technologies. Until the world has such brainy �white knights�, its save.


Paul Smith, as a talented writer and well-known blogger, is wonderful worker of bestresumewritingservice. This brilliant writer is very good at computer technology, computer history and innovations. To find out more about Paul and his works, you can reach him at Google+
Read more...

Friday, 20 December 2013

Top 6 Black Hat Hackers In The World

There are two types of hackers. First one are good hackers who are known as "white hat" hackers and another one which we will be talking about today are called "black hat" hackers. In this article, we will be talking about six famous black hat hackers and their hacks which made them famous or wanted.

George Hotz

Young and talented and what is the most important bored teenager, George Hotz wanted to have fun one summer night and  as a result he hacked the Sony�s company Iphone. It happened in June of 2007, by that time George was 17. It was a bit of a challenge, because how to hack device with assistant things?  The secret is to figure out how �to speak to the device�.He also mentioned that what he did was completely legal.It seems people can be dangerous in certain way when they are bored. Who knows what may happen if crazy smart geek will find thy way of his ideas.

Kevin Mitnick                                                            

Kevin Mitnick is well-known as the most-wanted computer criminal in the United States. He was in high school when he started hacking. For several years he hacked dozens of companies.What interesting, for those �services� he was finally arrested in 1995 at his apartment for hacking. Kevin also has served 5 years in prison, nevertheless despite of his experience he runs his own security firm named Mitnick Security Consulting. The other side of the coin is, however Mitnick published a book that calls �Ghost in Wires�, which is about his upps-and-downs, victories and crushes. He shared that every hack was like a climbing to mountain and he reached the Everest. This is one more proof how talent have pined, because of a boredom.

Adrian Lamo

Adrian was called as the most effective and controversial hacker of the 21st century. That is very flattering status.He was famous for breaking into several high-profile computer networks. Lamo might use his gift to help people to consult, what is actually he did, but as exception and compromise.His baby steps in hacking, Adrian Lamo made pretty early and became known for the first time for operating AOL watchdog site.As many others, he was arrested in 2003 and had to correspond for each and every computer crime.Thus, even if Lamo now works as a threat analyst and public speaker, his glory will always follow him, because our past if the part of our �present�  and a part of who we are.

Gary McKinnon 

This �black hat� McKinnon  hacked into 97 United States military and NASA computers. He could be the biggest threat  for government. Glasgow-born McKinnon wanted the truth to come out and show itself. In March 2002 Gary was arrested by police. �Black hat� used his hacking skills to �research� his beliefs and evidence of UFOs  inexhaustible source of power, into the US government�s computers. He didn�t do that because of boredom, but because of obsession and thirst to hidden knowledge. Probably this computer crime is serious, but forgivable. Man wasn�t going to hack computer system because he was bored or to prove something, we was looking for truth no more than.

Jonathan James

Story of Jonathan James  is sad, nevertheless his life can be compared to comet � short, but bright. In 1999 teenager at the age of 15 years old hacked into Bellsouth and Miami-Dade school network. Jonathan James damaged NASA Systems, it costed $41,000 to fix the systems.  It goes without saying that he made serious damage. To stole software from NASA that worth $1.7 Million is one the biggest computer crimes. He wasn�t after information or justice, he was after money� As they say, never speak ill of the dead.Jonathan James was sentenced 6 months house arrest and banned from using computer, however that didn�t prevent him to commit suicide.

Kevin Poulsen

This talented �cyber-terrorists� could have great career and almost blow his chance.  It seems that this hacker likes contracts  and his life reflects it pretty well. He hacked into the US Department of Defense's Arpanet. However later  he worked as a consultant testing Pentagon computer security. Late on Kevin hacked  FBI, after that hacked phone lines to radio station  of Los Angeles� Poulsen�s life reminded American switchbacks�Certainly he was wanted by FRI  and finally they caught him. Despite of such interesting past, Kevin is law-abiding citizen and has several awards  of International Academy of Digital Arts and Sciences.

Paul Smith deals with paper writing services reviews. He is well-educated and many-sided specialists, which experts in modern technologies, devises, robotics and informatics. To reach Paul you can use
Read more...