Skip to main content

The truth about hacking

The Process of attempting to gain or successfully    gaining, unauthorized access to computer resources   is called   Hacking.
Hacking is been a part of Computer for over 40 year's.The first hacker is from MIT

In  the  computer  security  context,  a  hacker  is someone who  seeks  and  exploits  weaknesses  in  a  computer system  or  computer  network.  The programers prefer to refer them as crakers.
This are the main reasons for hacker to hack a system.
-Just for fun.
-Show off.
-Notify many people their thought.
-Steal important information.
-Destroy enemy’s computer network during the war.

Hacking is mainly divided into two types
- ethical hacking
- unethical hacking
Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.This is Often done to protect from. Hacking

Unethical hacking  is often done to break into a network system to steal information or money, and sometimes to cause damage by inserting a virus or malware program.Unethical hacking is against the law, and those who engage in the act are considered cyber criminals.

You should follow following steps if you find out your system is hacked
- shutdown the system
- Remove it from Network so that other systems can't be effected by it
- Restore system with backup
- Now you can connect your system to Network
- It is advisable to inform police
Advantages:
-Can be used to recover lost information where the computer password has   been lost.
-Teaches you that no technology is 100% secure.

-To test how good security is on your own network.
Disadvantages :
- criminals use it to their advantage
- it can harm others privacy.
So it is made illegal.
Conclusion:

Keep your password  protected. Write  your password should be with combination of  characters, digits, special symbols.  Do not respond to feck on fishing email. when you are doing any online  transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .

Comments

Popular posts from this blog

Wi-vi the wifi vision

ABSTRACT: A new technology known as  Wi-Vi is bouncing up with a good progress.It is similar Radar and Sonar imaging..it depends on radio signals  of wifi.I monitor movements of people in closed rooms or behind a wall. Wi-Vi was created by Dina Katabi ,a professor  in MIT,and her graduate student Fadel Adib. Wi-Vi technology can detect number of humans in a closed room. Enable communication through a wall without carrying a wireless device.Identify simple gestures from behind a wall. This Wi-Vi signals uses Wi-Fi signals,as Wi-Fi signals can penetrate through walls. Wi-Vi relies on a simple hardware of 2.GHz  Wi-Fi radios small enough to be portably used.Integrated in hand held devices.Low power Wi-Fi signals are used. A Wi-Vi system constitutes-  1.Two transmitting antennas 2.single receiver. This technology is based on principle of Rada and Sonar.Radar and Sonar works on Doppler effect. This technology uses reflected Wi-Fi signals...

Brain chips

Introduction: Thousands of people around the world suffer from paralysis they need to depend on some one for even some basic   tasks brain chips can become  a handy at this case .Brains are made with a view to enhance the memory of human beings, to help paralyzed patients, and are also intended to serve military purposes. It is likely that implantable computer chips acting as sensors, This is like a implantable computer chip in brain. This consists of both biological and electronic term's. A chip in the Braingate system is of 100 hair thin electrodes.It senses electromagnetic signature of Neutrons.The Brain chip provides fast and reliable connection between the brain of a severely disabled person and personal computer. Braingate is a technology is a technology by which the electrical signal is exchanged by neurons within the brains are used to execute body moment .  Hardware of brain chips  It mainly consists of. Four parts ->chips: A Four ...