Edit Other's Web Site

Written by Unknown 1 comments Posted in:

Copy and paste following code line in address bar and you can see that you are able to edit the web page contain which currently displayed in your web browser.

code line:
javascript:document.body.contentEditable='true'; document.designMode='on'; void 0


Try above java script and you can edit whatever you want
on website and see. However you can not permanently save your changes at this stage. Have fun !

Read more

A computer virus is a computer program that has ability to entering to computer, storing itself and infects a computer without the permission or knowledge of the owner.



Boot Virus
Boot Virus affects the boot sector of a floppy or hard disk.

Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

FTP trojans
These trojans open port 21 on your computer letting everyone having a FTP client to connect to your computer without password with full upload and download options.

Malware
Short for malicious is software designed to infiltrate a computer without the owner's informed consent.

Worms
A worm is a program very similar to a virus, it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by anti-viruses.

Logic Bombs
They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.
Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

E-mail spam
E-mail spam, known as unsolicited bulk Email, junk mail, or unsolicited commercial email, is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.

Spyware
Spyware is a type of malware that is installed on computers without the permission or knowledge of the owner and that collects information about users without their knowledge. The presence of spyware is typically hidden from the user.
While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs.

Password Sniffer
Password Sniffer can listen on LAN and enables network administrators or parents to capture passwords of any network user. Currently, Password Sniffer can monitor and capture passwords through FTP, POP3, HTTP, SMTP, Telnet, and etc.

Read more

The Hacker Attitude

Written by Unknown 0 comments Posted in:

Technically, a hacker is someone who is enthusiastic about computer programming, networking, FOSS (free open source software) and all things relating to the technical workings of a computer.

Want to be a Hacker :

  1. The world is full of fascinating problems waiting to be solved.
  2. Nobody should ever have to solve a problem twice.
  3. Boredom and drudgery are evil.
  4. Freedom is good.
  5. Attitude is no substitute for competence.
Skills you should have :
  1. Learn how to program.
    This is the fundamental hacking skill. It means you'll have to learn a programming language. Preferably more than one; you can learn a lot by comparing two languages and look for similarities and differences in the way they handle a situation.
    But programming is more than writing code.
  2. Learn to run an OS.
    The Hacker community is much Unix/Linux oriented (nowadays). There are several reasons, an important one being that with (open-source) Unixes you get the code as well. You can actually read how the operating system is written, you can get to know it well enough to modify if you want to.
    Unix / Linux is also very network/internet oriented : learning to understand Unix / Linux will help for the next skill you'll need to acquire. And it comes with free programming tools.
    (get your hands dirty : Learn Linux Hands-On) :
  3. Learn about Data Communication and Networking : How do computers talk to each other ?
  4. Learn how to use the World Wide Web and write HTML.
    Technically, the internet is just a collection of computer networks. But it has become an important communication medium as well, and can be used for many things. Sharing information is one. You'll need to know how to write HTML to publish on the web. Designing a web site with a good logical structure and a matching directory structure is also an exercise worth doing to sharpen a skill or two.
  5. If you don't have functional English, learn it. A lot of information, be it on the web or in books, is only available in English. And apparently English has developed a richer technical vocabulary so that a lot gets lost in translations.
Style

Activities that show you may have this ability, and can help you to improve it, are
  • Learn to write your native language well. Expressing your thoughts (in writing) helps to organize your thoughts, see relationships, approach a subject from different angles.
  • Read science fiction
  • Study Zen
  • Develop an analytical ear for music. Learn to appreciate peculiar kinds of music. Learn to play some musical instrument well, or how to sing. Discover the mathematics of music, and the beauty in the mathematics.
  • Develop your appreciation of puns and wordplay.

Consider this Zen poem and keep close to your life

To follow the path,
look to the master,
follow the master,
walk with the master,
see through the master,
become the master.

Read more

It is my considered opinion that hackers are not criminals. They don't have intentions to damage or cause loss. They originated from the class of people who had an intrinsic thirst for knowledge. They wanted to stop at no point for gaining knowledge and letting the world benefit from their knowledge. Many historians will agree to the fact that knowledge always has been dangerous. So very beginning of my article I would like to bring you most popular hackers because they are important to you and bring you freedom.

1. Kevin Mitnick

Mitnick is perhaps synonymous with Hacker. The Department of Justice still refers to him as "the most wanted computer criminal in United States history." His accomplishments were memorialized into two Hollywood movies: Takedown and Freedom Downtime.

Mitnick got his start by exploiting the Los Angeles bus punch card system and getting free rides. Then similar to Steve Wozniak, of Apple, Mitnick tried Phone Phreaking. Mitnick was first convicted for hacking into the Digital Equipment Corporation's computer network and stealing software.

Mitnick then embarked on a two and a half year coast to coast hacking spree. He has stated that he hacked into computers, scrambled phone networks, stole corporate secrets and hacked into the national defense warning system. His fall came when he hacked into fellow computer expert and hacker Tsutomu Shimomura's home computer.

Mitnick is now a productive member of society. After serving 5 years and 8 months in solitary confinement, he is now a computer security author, consultant and speaker.


2. Adrian Lamo

Lamo hit major organizations hard, hacking into Microsoft and The New York Times. Lamo would use Internet connections at coffee shops, Kinko's and libraries to achieve his feats earning him the nickname "The Homeless Hacker". Lamo frequently found security flaws and exploited them. He would often inform the companies of the flaw.

Lamo's hit list includes Yahoo!, Citigroup, Bank of America and Cingular. Of course White Hat Hackers do this legally because they are hired by the company to such, Lamo however was breaking the law.

Lamo's intrusion into The New York Times intranet placed him squarely into the eyes of the top cyber crime offenders. For this crime, Lamo was ordered to pay $65,000 in restitution. Additionally, he was sentenced to six months home confinement and 2 years probation. Probation expired January of 2007. Lamo now is a notable public speaker and award winning journalist.


3. Jonathan James

At 16 years old, James gained enormous notoriety when he was the first minor to be sent to prison for hacking. He later admitted that he was just having fun and looking around and enjoyed the challenge.

James hit high profile organizations including the Defense Threat Reduction Agency, which is an agency of the Department of the Defense. With this hack he was able to capture usernames and passwords and view highly confidential emails.

High on James list, James also hacked in NASA computers and stole software valued at over $1.7 million. The Justice Department was quoted as saying: "The software stolen by James supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." Upon discovering this hack, NASA had to shut dow its entire computer system costing taxpayers $41,000. Today James aspires to start a computer security company.


4. Robert Tappan Morris

Morris is the son of a former National Security Agency scientist named Robert Morris. Robert is the creator of the Morris worm. This worm was credited as the first computer worm spread through the Internet. Because of his actions, he was the first person to be prosecuted under the 1986 Computer Fraud and Abuse Act.

Morris created the worm while at Cornell as a student claiming that he intended to use the worm to see how large the Internet was at the time. The worm, however, reproduced itself uncontrollably, shutting down many computers until they had completely malfunctioned. Experts claim 6,000 machines were destroyed. Morris was ultimately sentenced to three years' probation, 400 hours of community service and assessed a $10,500 fine.

Morris is now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. His focus is computer network architecture.


5. Kevin Poulsen

Frequently referred to as Dark Dante, Poulsen gained national recognition for his hack into Los Angeles radio's KIIS-FM phone lines. These actions earned him a Porsche among many other items.

The FBI began to search for Poulson, when he hacked into the FBI database and federal computers for sensitive wiretap information. Poulsen's specialty was hacking into phone lines and he frequently took over all of a station's phone lines. Poulson also reactivated old Yellow Page escort telephone numbers for a partner who operated a virtual escort agency. Poulson was featured on Unsolved Mysteries and then captured in a supermarket. He was assessed a sentence of five years.

Since his time in prison, Poulsen has worked as a journalist and was promoted to senior editor for Wired News. His most popular article details his work on identifying 744 sex offenders with Myspace profiles.

________________________________________________________
This smart peoples will help in future to improve the security holes on internet and provide information that people should know about.

Read more