About Hacking

Jun 5 • General • 6736 Views • 2 Comments on About Hacking

What is Hacking:

Demand of Ethical Hackers


Hacking is the practice of modifying some features of a system in order to accomplish a goal outside of the creator’s original purpose. The person who is consistently engaging in hacking activities as well as has accepted hacking as a lifestyle and philosophy of their choice, called a hacker. Here are some facts about hacking.

  • During the 1990s, the term “hacker” had denoted a skilled programmer who is proficient in machine code and computer operating system.
  • In particular, these individuals could always hack on an unsatisfactory system to solve problems and busy in a software company espionage by interpreting a competitor’s code
  • Some of these hackers also became experts at accessing password-protected computer, files, and networks and came to known as “crackers.”
  • An effective and dangerous “cracker” must be a good hacker and the terms became interrelated. Today it refers to anyone who performs some form of computer sabotage.

Types of Hacking:

Ethical Hacking

Website Hacking

The process of hacking can be done in following ways.

  1. Website Hacking: It means taking control from the website owner to a person who hacks the website.
  2. Network Hacking: It is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat etc over the network.
  3. Ethical Hacking: It is where a person hacks to find weaknesses in a system and then usually patches them.
  4. Email Hacking: It is illicit access to an email account or email correspondence.
  5. Password Hacking: It is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  6. Online Banking Hacking: It is unauthorized accessing bank accounts without knowing the password or without permission of account holder.
  7. Computer Hacking: It is when files on your computer are viewed, created, or edited without your authorization.

Hacking Tools:

System distinguishing proof/OS fingerprinting

             Security Tools

There now are more than 100,000 known viruses and more appearing virtually daily which are responsible for about all type of hacking. The variety of hackers  can affect any computer owner whether an home user, e-mailer, student, blogger, or a network administrator dealing on  site or on the internet.

  • Viruses
  • Exploits
  • Worms

Viruses: The term computer “virus” originated to describe machine code command inserted into a computer’s memory that on execution copies itself into other programs and files present in the computer.

Exploits: An exploit and operates through a network security vulnerability without previous access to the that system is a “remote” exploit. An exploit that needs prior access to a system is termed a “local” exploit.

Worms:  They are simply viruses that send copies over network connections. A bomb resides silently in a computer’s memory until set off by an action. Like a Trojan horse is a malicious program that cannot reproduce itself, but is distributed by CD/ e-mail.

Precautions To Prevent Hacking:  Here are some other clues that might give away a fake:


      Prevention from Hackers

  • Look for evidence of a real-world presence as an address, a phone number, an email contact. If you are in doubt send an email make a phone call or write a letter to establish whether they really exist.
  • The website’s address is different from what you are used to. Perhaps there are extra characters or words in it or it can use a completely different name or no name at all, just numbers.
  • Right-click on a hyperlink and select “Properties”, it will reveal a link’s true destination beware if this is different from what is displayed in the email.
  • Even though you are asked to enter private information there is NO padlock in the browser window or ‘https://’ at the beginning of the web address to signify that it is using a secure link and that the site is what it says it is.
  • A request for personal information such as user name, password or other security details IN FULL, when you are normally only asked for SOME of them.



Related Post:

Tell us Your Queries, Suggestions and Feedback

Your email address will not be published.

2 Responses to About Hacking

  1. shopping says:

    What’s up, yes this article is really good and I have learned lot of
    things from it about blogging. thanks.

  2. Ajitesh Shukla says:

    Well described article about hacking. This article is a summation of everything related to hacking.

« »