In computer networking, hacking is a technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person who is engaged in hacking. The term “hacking” historically referred to constructive,and clever technical work that was not necessarily related to computer systems. But today hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks. Origin of Hacking
- In 1950s and 1960s, MIT engineers first popularized the term and concept of hacking.It was started at the model train club and later in the mainframe computer rooms.
- At that time the so-called “hacks” attacks by these hackers were intended to be harmless technical experiments and fun learning activities.
- As time passed, others began applying the term to less honorable pursuits. Before the popularity of Internet several hackers in the U.S. experimented with methods to modify telephones for making free long-distance calls over the phone network illegally.
Hacking vs. Cracking: Malicious attacks on computer networks are known as cracking but hacking truly applies only those activities having good intentions. Most non-technical people fail to make this distinction. Outside of academia, its extremely common to see the term “hack” misused and be applied to cracks also. What to do after been Hacked:
When you first realize you may have been hacked its important to decide your course of action.First disconnect computer from the Internet or shut it down entirely to break the connection with the hacker. Depending on the situation this may be only way. There cab be many more clues and and you may gather more evidence by performing certain actions while the system is still live.
- Prepare to detect and respond to incident.
- Detect the incident
- Gather all clues and evidences
- Clean system and patch vulnerabilities
- Recover lost data and files
- Take lessons from incident and apply them to secure for future
How to prevent Computer Hacking:
1. Perform required software updates time to time for operating system and web browser: A system that hasn’t been updated recently has flaws in it that can be taken advantage of by hackers. Go to the Microsoft Update website, download patches and secure the most recent version.
2. Install a firewall on your computer: It forbid outside threats such as hackers, viruses from gaining access to your system. Personalize firewall setting during the setup process to reflect how much data you want to allow into your system.
3. Purchase or download anti-virus software: Many computers come pre installed with certain anti-virus software, but if not,research online to find what product suits you. Anti-virus software is crucial to keep your computer healthy. A weak computer,or racked with viruses is more susceptible to hacking.
4. Delete email from unknown sender and always be aware: Never click on an email link that looks questionable and erase it as soon as possible.
Write your COMMENTS Below
- Hacking Websites
- Hacking Tools
- Learning Hacking
- Ethical Hacking Certification Via Distance Learning by Indian Cyber Army