Tuesday 18 June 2013

WHAT IS HACKER : ?


In a sense it is stupid to argue about the word `` ware''betekenis. One word means people use it to mean. I'm not Française Sciences, I can not force the word `` hacker to my definition Newsweek gebruik''volgens official. However, understanding the etymological history of the word `` hacker''kan help in understanding the current social situation. 

The concept of computer hacking culture at the Massachusetts Institute of Technology in the 1960s. Online at MIT thought posited that there are two types of students, tools and hackers. A `` instrument''is anyone attending regular classes, always in the library when no class is meeting and getting straight As. A `` hacker''is the opposite: someone who never goes to class, which really sleep all day and spend the night following leisure activities rather than study. 

There was probably no middle ground. What has this to do with computers? Initially, nothing. But there are standards for success as a hacker, as grades are a standard for success as an instrument. The true hacker can not just sit around all night, he needs a hobby with commitment and flair to follow.

 It can be mobile, or railroads (model, real or both), or science fiction fandom, or radio broadcast or ham radio. It can be one of them. Whether it be computers. [In 1986, it is generally the word `` hacker''gebruik among MIT students to refer to a computer, but to building hackers hackers, people who have roofs and tunnels where they are supposed to be detected.] `` A computer hacker,''then, is someone who lives and breathes computers, who already have computers, a computer to do something to recognize. Equally important is the attitude of hackers. Programming a hobby, something done for fun, not by a sense of duty or for money. (It's okay to make money, but this may not be the reason for piracy.)

 A hacker is an Aesthete. There are specialties within computer hacking. An algorithm hacker knows all the best algorithm for each problem. A system hacker knows about designing and maintaining operating systems. And a `` hacker''weet password how to find someone else's password. That's what Newsweek should follow their call. Someone decides to crack a security system for financial gain is not a hacker at all. Is not that a hacker can be a thief, but a hacker can be a professional thief. 

A hacker must be essentially an amateur, even if hackers can pay for their expertise. A password hacker whose main interest is in learning how the system is not necessarily refrain from stealing information or services, but someone whose main interest is stolen is not a hacker. This is a matter of emphasis.

TYPES OF HACKING:

Ethical Implications Conclusion Hacking hobby
profession of working with computers.
Breaking into computers Access Types Hacking Website Hacking Email Hacking
Network Hacking
Password Hacking
Computer Hacking Online
 Banking Hacking
Website Hacking Main focus Vulnerable loopholes collapses the information Make changes to the information E-mail Hacking Can Email Be Hacked?
 Store business information, private information Serious precautions are not taken Computer Hacking Steals information from computer Remote Desktop Connection technique Accessing another person's files online banking Hacking Online Banking disadvantages Hackers create fake sites with proper website address Ethical Hacking computer or network expert search vulnerabilities victims -

Official & Private websites ethical hackers do? An ethical hacker's evaluation of a system security seek to answer this basic question:

What can an intruder see on the target systems? What are you trying to protect?
What can an intruder do with that information? Thousands of dollars in fines Imprisonment Claim your computer Consequences Conclusion Proper ethical hackers are employed to practice with exact URL empty your Internet while not in use Summary Hacking be exposing your passwords to trusted sites are of two types There are different types of hacking ethical hacking - a legitimate method Consequences of illegal hacking,..

TYPES OF HACKING:

Types of burglary - Presentation Transcript Hacking a technological threat Overview


What types of hacking hacking hacking?

 Ethical Implications Conclusion Hacking hobby
profession of working with computers.
Breaking into computers Access Types Hacking Website Hacking Email Hacking
Network Hacking
Password Hacking
Computer Hacking Online
 Banking Hacking
Website Hacking Main focus Vulnerable loopholes collapses the information Make changes to the information E-mail Hacking Can Email Be Hacked?
 Store business information, private information Serious precautions are not taken Computer Hacking Steals information from computer Remote Desktop Connection technique Accessing another person's files online banking Hacking Online Banking disadvantages Hackers create fake sites with proper website address Ethical Hacking computer or network expert search vulnerabilities victims -

Official & Private websites ethical hackers do? An ethical hacker's evaluation of a system security seek to answer this basic question:

What can an intruder see on the target systems? What are you trying to protect?
What can an intruder do with that information? Thousands of dollars in fines Imprisonment Claim your computer Consequences Conclusion Proper ethical hackers are employed to practice with exact URL empty your Internet while not in use Summary Hacking be exposing your passwords to trusted sites are of two types There are different types of hacking ethical hacking - a legitimate method Consequences of illegal hacking,..

TYPES OF HACKING:


Types of burglary - Presentation Transcript Hacking a technological threat Overview

What types of hacking hacking hacking?

 Ethical Implications Conclusion Hacking hobby
profession of working with computers.
Breaking into computers Access Types Hacking Website Hacking Email Hacking
Network Hacking
Password Hacking
Computer Hacking Online
 Banking Hacking
Website Hacking Main focus Vulnerable loopholes collapses the information Make changes to the information E-mail Hacking Can Email Be Hacked?
 Store business information, private information Serious precautions are not taken Computer Hacking Steals information from computer Remote Desktop Connection technique Accessing another person's files online banking Hacking Online Banking disadvantages Hackers create fake sites with proper website address Ethical Hacking computer or network expert search vulnerabilities victims -

Official & Private websites ethical hackers do? An ethical hacker's evaluation of a system security seek to answer this basic question:

What can an intruder see on the target systems? What are you trying to protect?
What can an intruder do with that information? Thousands of dollars in fines Imprisonment Claim your computer Consequences Conclusion Proper ethical hackers are employed to practice with exact URL empty your Internet while not in use Summary Hacking be exposing your passwords to trusted sites are of two types There are different types of hacking ethical hacking - a legitimate method Consequences of illegal hacking,..

Grey Hat hacker:


A  Grey Hat is a hacker who share White Hat and some black hat. They can be both helpful and harmful, and should be treated with respect ....

The Grey Hat's name comes from the fact that a Grey Hat halfway between a black hat and a white hat, and can be both harmful and helpful....

Red Hat hacker :


A Red Hat Red Hat, is an aggressive version of a White Mage in the service of a government agency whose mission is to hack into the main computer of other governments in order to stop or Cripping them...

Blue Hat hacker :


 Blue Hat-A is a rouge hacker who hacks for fun or to get revenge on a certain person or company that could harm them.

 You should avoid angering or insulting Blue Hats should be very easy due to the fact that most Blue Hats are passive in nature and would rather practice on a person they really hate.

Blue Hats is related to "noobs" because of the fact that they do not really care that much about hacking.

Green Hat hacker :


A  Green Hat is a name for a new / newb hacker, who just started to practice hacking.

 Green Mages are related to "Newbs" due to the fact that they show a desire to learn about hacking and listen to more experienced hackers,

 and

 they do not suffer from ADHD-like Noobdom Blue Hats.

White hat hacker :


 a white hat is a hacker paid and work for a government agency to deliberately hack into a computer mainframe any potential weaknesses to be found in a computer mainframe,

 and

 then figure out how to get them to loose.

Black Hat hacker :


A  black hat hacker who is aggressive in nature. Black Hat Zombie computers are known to be created using a computer virus, Black Hat will use a website to crash unless their demands are met.

Black Caps are generally very intellegent in nature and will work in teams (nicknamed the "Wolf Pack" of Internet users) to bring more websites (some groups Highly-Skilled Black Caps have known the Government Agencies falling ).

Black Caps are very dangerous, especially in groups and should be treated as such, there is also a passive version of the black hat, known as Grey Hat, discussed later.

 Also note that, after being caught, most (if not all) of the goverment-set the Black Caps are recruted by the Agency that they are captured on behalf of a Black Hat Red Hat .comes from the character of Final Fantasy black magician class, due to the fact that both Black Hat and Black Mages is "submit a / aggressive offensive role. nickname for a group of Black Hats work togther a website (" Wolf Packs "if you forgot) comes from the nickname given by Allied sailors in groups of German U-boats to cooperate allied supply convoys consumed during World War II crash.......

hacker. ?

HACKER:

undefined                           


       
                                                                     
                  

WHAT IS OPERATING SYSTEM: ?


A program that acts as an intermediary between a user of computers and computer hardware.
Operating system goals: Execute user programs and make solving user problems easier.
Make use of the computer system convenient. Use the computer hardware in an efficient manner...

COMPUTER SYSTEM DIAGRAM :


undefined

OSI MODEL DIAGRAM :


undefined

PHYSICAL LAYER DIAGRAM :


undefined

DATA LINK LAYER DIAGRAM :


undefined

HOP TO HOP DELIVERY DIAGRAM :

undefined

SOURSE TO DESTINATION DELIVERY DIAGRAM :

undefined

SOURSE TO DESTINATION DELIVERY DIAGRAM :


undefined

TRANSPORT LAYER DIAGRAM :

undefined

TRANSPORT LAYER DIAGRAM :


undefined

SESSION LAYER :



undefined

PRESENTATION LAYER :-


TCP/IP AND OSI MODEL DIAGRAM :

undefined

what is INTERNET ?


the Internet, sometimes called simply "the Net" is a worldwide system of computer networks - a network of networks in which users on a computer if they consent, to get information from another computer (and sometimes directly by talking to users in other computers). It is through the Advanced Research Projects Agency (ARPA), the U.S. government in 1969 and was named the first ARPANET.

The initial goal was to create a network that will allow users of a computer in a university research to be able to "talk to" research computers at other universities to create. A side benefit of ARPANET's design was that,  because messages can be routed or rerouted in more than one direction, the network can continue to function even if parts of it were destroyed in the event of a military attack or disaster other. Today, the Internet is a public facility, collective, and self-sustaining accessible to hundreds of millions of people worldwide. Physically, the Internet uses a portion of total resources currently existing public telecommunication networks. Technically, what distinguishes the Internet is used asset protocols called TCP / IP (Transmission Control Protocol for Protocol / Internet). Two recent adaptations of Internet technology, intranet and extranet, also make use of TCP / IP protocol. For many Internet users, almost electronic mail (email) replaced the Postal Service for short transactions in writing. E-mail is the most used application on the Net.

 You can also feed on "Conversations" live with other computer users, using Internet Relay Chat (IRC). More recently, Internet telephony hardware and software allows real-time chat voice. Most used the Internet World Wide Web (often abbreviated "WWW" or called "Web"). Outstanding feature is hypertext, a method of direct cross reference. In most sites, certain words or phrases appear in the text of a different color from the rest, often this text is highlighted. When you choose one of these words or phrases, you will be transferred to the site or page related to that keyword or phrase. 

Sometimes there are buttons, images, or parts of images that are "removed." If you place your cursor over a site and the cursor turns into a hand, it shows that you can click and be transferred to another site. Using the Internet, you can access millions of pages of information. A browser is done with a browser, the most popular of which is Microsoft Internet Explorer and Netscape Navigator. The occurrence of a particular site may vary slightly depending on what browser you use. Even later versions of a particular browser are able to more "bells and whistles" such as animation, virtual reality, audio and music files to give than previous versions.

What is Computer Network?

Internet is simply a type of network. When multiple devices are connected, usually we can as a network. If these devices are computers, we will see it as a computer network.

What is DHCP?


 DHCP is not DHCP. It is used for IP addresses to give computer and other types of network configurations such as DNS. DHCP cut administrative tasks using the IP address for computer systems in a network.

What is DNS and how it really works?



 DNS means Domain Name System that translates host names into the IP network and IP addresses to host names. Every computer and web domains on the characteristic designated IP addresses. Internet communication is dependent on these IP addresses. These addresses are created in the format of 10.1.1.200, 192.168.2.0, etc. It is difficult these IP addresses to remember, but host names are easier to remember than their IPs.

What is the PC Firewall?



 It is a protective boundary for any network. It prevents unauthorized access resources on the network. The majority of the operating system from Microsoft systems such as Windows XP Service pack2, generated firewall Utilities.

what is cisco ?



CISCO is a computer system company.

there are some corse available in cisco certification like :

1> ENTRY LEVEL

CCENT
CCT

2> ASSOCIATED

CCDA
CCNA
CCNA SECURITY

3> PROFESSIONAL

CCDP
CCIP
CCNP
CCNP SECURITY
CCNP SP OPERATIONS
CCNP VOICE
CCNP WIRELESS
CCSP

4> EXPERT

CCDE DESIGN
CCIE ROUTING AND SWITCHING
CCIE SECURITY
CCIE SERVICE PROVIDER
CCIE VOICE
CCIE WIRELESS