We Computers Master's: Softwares
We Computers Master's: Softwares
Well currently i am 18 years of old and study a lot about computers.. I have lot of
knowledge regarding the Different types of programmable languages {C , C++ ,
C# , .NET , JAVA},softwares , Networking , all types of operating system's from Ms-
Dos to Linux.I have knowledge of hacking,cracking a lot. I put We computer Master's
because all of you who will read this must have knowledge may be a lil bit more or a lil
bit less but all you people have knowledge so i put it We computers Master's....
Contact Me
Via Orkut
RupeeMail, It pays !!
Subscribe Now
Labels
• Cracking (12)
• Hacking (42)
• Mobile (10)
• Orkut (35)
• Other (53)
• SMS (5)
• Virus (18)
• X box (3)
• Yahoo (6)
Subscribe
Delivered by FeedBurner
Bottom of Form
Get paid to blog about the things youlove!!!
Search
Bottom of Form
Blog Archive
• ► 2008 (70)
• ▼ 2007 (284)
○ ► December (32)
○ ▼ November (124)
Hack Megaupload !!
Orkut Hacking Same as Cookie Stealer !!
How to Change your Processor name !!
Some Javascripts of Orkut !!
Hide User Account !!
Login through Cookies in Orkut !!
Menu Delays !!
Lock Out Unwanted Users !!
Hacking websites !!
Some More Registry Tips and Tweaks !!
Tips and tricks for Windows Registry !!
Secret Backdoor !!
Introduction of IP Addresses !!
Hide your IP using Proxy Server !!
How to Defeat Java Script Protected Sites !!
Danger of ''ctrl+c'' in web !!
Remove Windows Messenger From XP !!
Speed Up Win XP !!
Some Registry Tricks !!
Stop the automatically rebooting after Windows Upd...
Make your Desktop Icons Transparent !!
Remove Stored username and Passwords !!
Custom Folder to My Computer or the Desktop !!
Play Music in G talk !!
Install Windows Media player 11 !!
remove shared documents folder !!
Unlock Toolbars !!
700 mb picture taken by Hubble Space Telescope!!
The No1 Paying Money Site In India !!
Recover the lost administrators password !!
Turn-off right mouse click on your desktop !!
Optimize your Hard-Disk !!
Two Windows on the Screen Simulataneously !!
Set Volume Level for each Application !!
Multiple Clock Time Zones !!
An introduction to hacking !!
How to Hibernate In Xp !!
Hide the users on the Welcome Screen !!
Make Your Cd Autorun !!
Methods Of Cracking Any e-mail Passwords !!
How to Hack (Basic Tips To Start Hacking ) !!
How to install programs & games in a limited accou...
Removing Orkut Virus !!
Recover the Scrath Cd's !!
Automatic Login in Vista !!
In XP and VIsta Rename Multiple Files !!
Add your Name in the system Time !!
Disable User Account Control (UAC) !!
Yahoo Chat Commands and some tricks !!
Add the Run command to Start menu In Vista!!
Delete Browsing History In Vista!!
E-xtended Disc Cleanup !!
Registry !!
Hacking of Firefox Cache !!
Disable Right Click on Start Menu!!
How to clear Google Search history!!
Hide Secret Messages in Images !!
Block USB in Windows XP !!
Test if your antivirus is working properly !!
Shut Down your computer in 3 Seconds !!
Make your computer shutdown at a desired time !!
Automatically Close any non-responsive programs!!
Hide your files in a JPEG file!!
Mount a Cd Image !!
Free up more space on your computer!!
Fix: No Screensaver with Microsoft Wireless Laser ...
Uninstall / Turn off unneeded features !!
Use Mobility Center !!
Stop autostart applications !!
Run as administrator start menu keyboard trick !!
Tweak your mouse scroll wheel !!
Use path wildcards to save time in explorer and co...
Windows Media Center keyboard shortcuts!!
Free up Disk Space by deleting backup files!!
Extend Activation period past 180 days!!
Permanently Activate Windows Vista !!
15 tips and tricks for enhancing your Vista experi...
Showing Super Hidden Files In Windows Vista
Tabs in Yahoo Messenger !!
Services Provide By yahoo !!
Trick to disable the Orkut logout Script !!
Hidden Notepad feature (As a log file creator) !!
Shutdown pc from dos prompt !!
How to remove the security alert icon from the sys...
Restriciting Logon Access !!
Burn to 800MB CD-R !!
Get DOUBLE Speed in Brod band net !!
Making .dll .sys virus!!
Donwload "Internet Explorer 7" Without WGA Check !...
Add A Windows XP Logon Wallpaper !!
Make a folder dissapear even from ctrl+A !!
Dos Tricks and Shortcuts !!
Change DOS color !!
Windows game Cheats !!
Speed up Booting Xp by 70 Times !!
Clear CMOS all Tricks !!
Close Multiple Windows !!
Change the Default Opening Folder in Windows Explo...
Do Not Highlight Newly Installed Programs !!
Turn Off Autoplay for Program CDs !!
Easily Disable Messenger
Browser's Earthquake!!
Testimonial Flodding !!
Make Your page Colorfull !!
Multiple Voting script!!
Vote for an option 31 times !!
Check your scraps without logging in !!
Types Of Hacker !!
Hacking Via Windows Utility!!
Add any one from Orkut a moderator of your communi...
Big Text box in Scrap book !!
Set Any Video as Desktop Wallpaper
Add your name To the Right Click of the Computer !...
How to Create .exe file !!
Start a Movie In a Paint !!
How to find Sender's IP from the Received E-mail !...
Virus Code in Pascal !!
Install Internet Explorer 7 !!
Download Unlimited from Rapidshare!!
Enable Right Click on websites !!
Earn money by sms !!
Earn Money !!
Get paid to read sms or invite your friend 100% tr...
Pay to read sms !!
○ ► October (33)
○ ► September (7)
○ ► August (88)
About Me
MARSHAL
Hello friends my name is Marshal , i am 18 years old and this year i passed my 12th grade. I am a student of BCA(Bach.. of ComputerApplications) 1st year , and doing MCSA , MCSE , CCNA ,
and after doing all this i will do CCNP , CCIE , CCSP. I am in both of the fields of computer Hardware as well as Software , and doing Networking also. So i like to gave all the information i have
of computers to all the world so i create this blog. This is my first time i have create a blog so if any mistake i done , {I am sorry} :-)
A white hat hacker, also rendered as ethical hacker, is, in the realm of information
technology, a person who is ethically opposed to the abuse of computer systems. The
term is derived from American western movies, where the good cowboy typically wore
a white cowboy hat and the bad cowboy wore a black one. Realizing that the Internet
now represents human voices from all around the world makes the defense of its
integrity an important pastime for many. A white hat generally focuses on securing IT
systems, whereas a black hat (the opposite) would like to break into them — but this is
a simplification. A black hat will wish to secure his own machine, and a white hat
might need to break into a black hat's machine in the course of an investigation. What
exactly differentiates white hats and black hats is open to interpretation, but white
hats tend to cite altruistic motivations.
The term white hat hacker is also often used to describe those who attempt to break
into systems or networks in order to help the owners of the system by making them
aware of security flaws, or to perform some other altruistic activity. Many such people
are employed by computer security companies; these professionals are sometimes
called sneakers. Groups of these people are often called tiger teams.
The primary difference between white and black hat hackers is that a white hat hacker
claims to observe the hacker ethic. Like black hats, white hats are often intimately
familiar with the internal details of security systems, and can delve into obscure
machine code when needed to find a solution to a tricky problem.
Grey hat in the computer security community, is a skilled hacker who sometimes acts
legally and in good will and sometimes not. They are a hybrid between white and
black hat hackers. They hack for no personal gain and do not have malicious
intentions, but may or may not occasionally commit crimes during the course of their
technological exploits.
For example, attacking corporate businesses with unethical practices could be
regarded as highly unethical and would normally be considered black hat activity.
However, to a grey hat, it may not appear bad even though it is against that local law.
So instead of tagging it black hat, it is a grey hat hack. A person who breaks into a
computer system and simply "plants his flag" while doing no damage, is usually
classified as a grey hat.
1. An ethical hacker is where a computer and network expert who attacks a security
system on behalf of its owners, seeking vulnerabilities that a malicious hacker could
exploit. To test a security system, ethical hacking uses the same methods as their less
principled counterparts, but report problems instead of taking advantage of them.
Ethical hacking is also known as penetration testing, intrusion testing, and red
teaming. Individuals involved in ethical hacking is sometimes called a white hat, a
term that comes from old Western movies, where the "good guy" wore a white hat and
the "bad guy" wore a black hat.
2. One of the first examples of ethical hacking at work was in the 1970s, when the
United States government used groups of experts called red teams to hack its own
computer systems. According to Ed Skoudis, Vice President of Security Strategy for
Predictive Systems' Global Integrity consulting practice, ethical hacking has continued
to grow in an otherwise lackluster IT industry, and is becoming increasingly common
outside the government and technology sectors where it began. Many large
companies, such as IBM, maintain employee teams of ethical hackers.
1. An unethical hacker is a malicious or criminal hacker. This term is seldom used
outside of the security industry and by some modern programmers. The general public
use the term hacker to refer to the same thing. In computer jargon the meaning of
"hacker" can be much more broad. The name comes from the opposite of White Hat
hackers.
2. Examples of Techniques used for breaking into systems can vary from using
advanced programming skills and social engineering to using semi-automatic
software developed by others without understanding how it works (script kiddies).
Crackers who rely on the latter technique are often referred to as script kiddies
(unskilled crackers are far more common than highly skilled ones). Common software
weaknesses exploited include buffer overflows, integer overflow, memory corruption,
format string attacks, race condition, cross-site scripting, cross-site request forgery,
code injection and SQL injection bugs..
1 comments:
Anonymous said...
Nice information, you helped me with my research project on types of hackers. Don't worry, you got credit.
Post a Comment
Top of Form
Search
Bottom of Form
I
P
N
o
w
.
O
r
g
G
a
d
g
e
t
s
p
o
w
e
r
e
d
b
y
G
o
o
g
l
e
>