You can make your account in just few seconds and start earning from it.
HACKGURU is designed mainly to explain what is hacking, its types and the basic tips and tricks of hacking, and how to protect your system from different hackers, information about new technologies. For mobile updates of this bolg, send from your mobile as : JOIN HACKGURU21 to 567678.
You can make your account in just few seconds and start earning from it.
Hacking is not limited to computers. The real meaning of hacking is to expand the capabilities of any electronic device; to use them beyond the original intentions of the manufacturer. As a matter of fact, the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains. They wanted them to perform faster and more efficiently. So, is hacking always bad? Not really. It only depends on how to use it. But it wasn't until a group of these hackers decided to exert their knowledge in the computer mainframes of the MIT.
During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. Within these group of people, a phreaker became famous because a simple discovery. John Draper, also known as Captain Crunch, found that he could make long distance calls with a whistle. He built a blue box that could do this and the Esquire magazine published an article on how to build them. Fascinated by this discovery, two kids, Steve Wozniak and Steve Jobs, decided to sell these blue boxes, starting a business friendship which resulted in the founding of Apple.
By the 1980's, phreaks started to migrate to computers, and the first Bulletin Board Systems (BBS) appeared. BBS are like the yahoo groups of today, were people posted messages of any kind of topics. The BBS used by hackers specialized in tips on how to break into computers, how to use stolen credit card numbers and share stolen computer passwords.
It wasn't until 1986 that the US government realized the danger that hackers represented to the national security. As a way to counteract this menace, the Congress passed the Computer Fraud and Abuse Act, making computer breaking a crime across the nation.
During the 1990's, when the use of the internet widespread around the world, hackers multiplied, but it wasn't until the end of the decade that system's security became mainstream among the public.
Today, we are accustomed to hackers, crackers, viruses, Trojans, worms and all of the techniques we need to follow to combat them.
In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.
A security exploit is a prepared application that takes advantage of a known weakness.
A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)
A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.
A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.
Social Engineering is the art of getting persons to reveal sensitive information about a system. This is usually done by impersonating someone or by convincing people to believe you have permissions to obtain such information.
A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.
A keylogger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Often uses virus-, trojan-, and rootkit-like methods to remain active and hidden.
WHITE HAT HACKER
GREY HAT HACKER
BLACK HAT HACKER
CYBERTERRORIST
A Cyberterrorist uses technology to commit acts of terrorism. Their intentions are to cause physical, real-world harm to social, ideological, religious, political, or governmental establishments. Such as using DOS (Denial of Service) attacks to take down entire websites.
Script kiddie
A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others. These are the outcasts of the hacker community.
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a political message.
Adam and Eve virus: Takes a couple of bytes out of your Apple.
Airline virus: You're in Dallas, but your data is in Singapore.
Anita Hill virus: Lies dormant for ten years.
Arnold Schwarzenegger virus: Terminates and stays resident. It'll be back.
AT&T virus: Every three minutes it tells you what great service you are getting.
The MCI virus: Every three minutes it reminds you that you're paying too much for the AT&T virus.
Bill Clinton virus: This virus mutates from region to region and we're not exactly sure what it does.
Bill Clinton virus: Promises to give equal time to all processes: 50% to poor, slow processes; 50% to middle-class processes, and 50% to rich ones. This virus protests your computer's involvement in other computer's affairs, even though it has been having one of its own for 12 years.
Congressional Virus: Overdraws your computer.
Congressional Virus: The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.
Dan Quayle virus: Prevents your system from spawning any child processes without joining into a binary network.
Dan Quayle virus: Simplye addse ane ee toe everye worde youe typee..
David Duke virus: Makes your screen go completely white.
Elvis virus: Your computer gets fat, slow, and lazy and then self destructs, only to resurface at shopping malls and service stations across rural America.
Federal bureaucrat virus: Divides your hard disk into hundreds of little units, each of which do practically nothing, but all of which claim to be the most important part of the computer.
Freudian virus: Your computer becomes obsessed with marrying its own motherboard.
Gallup virus: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time (plus or minus a 3.5 percent margin of error).
George Bush virus: Doesn't do anything, but you can't get rid of it until November.
Government economist virus: Nothing works, but all your diagnostic software says everything is fine.
Jerry Brown virus: Blanks your screen and begins flashing an 800 number.
Madonna virus: If your computer gets this virus, lock up your dog!
Mario Cuomo virus: It would be a great virus, but it refuses to run.
Michael Jackson virus: Hard to identify because it is constantly altering its appearance. This virus won't harm your PC, but it will trash your car.
New World Order virus: probably harmless, but it makes a lot of people really mad just thinking about it.
Nike virus: Just Does It!
Ollie North virus: Turns your printer into a document shredder.
Oprah Winfrey virus: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.
Pat Buchanan virus: Shifts all your output to the extreme right of your screen.
Paul Revere virus: This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:.
Paul Tsongas virus: Pops up on December 25 and says, "I'm not Santa Claus."
PBS virus: Your PC stops every few minutes to ask for money.
Politically correct virus: Never calls itself a "virus", but instead refers to itself as an "electronic microorganism".
Richard Nixon virus: Also known as the "Tricky Dick Virus", you can wipe it out but it always makes a comeback.
Right To Life virus: Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.
Ross Perot virus: Activates every component in your system, just before the whole thing quits.
Ted Kennedy virus: Crashes your computer but denies it ever happened.
Ted Turner virus: Colorizes your monochrome monitor.
Terry Randle virus: Prints "Oh no you don't" whenever you choose "Abort" from the "Abort, Retry, Fail" message.
Texas virus: Makes sure that it's bigger than any other file.
UK Parliament virus: Splits the screen into two with a message in each half blaming other side for the state of the system.
Warren Commission virus: Won't allow you to open your files for 75 years.
OPEN THE REGISTERY EDITOR BY PRESSING [WINDOW]+[R] AND TYPE THE "regedit" PRESS ENTER AND NAVIGATE TO :-
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows/CurrentVersion\Explore \Desktop\ NameSpace\ LOOK FOR THE KEY"645FF040-5081-101B-9F0800AA002F954E
AND DELETE" this hack is for completely deleting the reclyebin ON THE OTHER HAND YOU SHOULD USE BELOW HACK:- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows/SehellNoRoam\MUICache AND CHANGE THE VALUE OF @C:\WINDOWS\system32\SHELL32.DLL,8964 TO WHATEVER YOU WANT.
Give password to your MsWord document and secure your data:
Password Protect
Open MS Word File
>Go to Tools
>Go to Options
>Go to Security
Then Type a Desired Password and save.
Done.