Posts

Share internet connection via bluetooth

Steps to ensure better security in Facebook

Facebook Shortcut Keys

Facebook Shortcut Keys

toll free no FOR AN pc laptop problem

hOW to MAKE An Invisible Folder

free international calls anywhere in the world via your PC

Free Quiz websites

SAMSUNG MOBILE TRICKS

FREE GPRS BROWSING FOR OPERA MINI IN AIRCEL FOR 2G & 3G NETWORKS

Aircel Now Provides "Balance Transfer Facility

FUNNY GOOGLE TRICKZ

HOW TO DIAL OUT ON A UNIX SYSTEM

!! dev D HACKER !!: Actual Spy Keylogger

Tools Description of System Hacking - Virtual Machines

Resource Hacker

Home Keylogger

Ardamax Keylogger

Actual Spy Keylogger

One of the best ways of using Pen Drive is as a temporary storage device

hidden RUN command for your PC

dev d hacker [hacking tips& trickz]

hacker !! i thought to produce a post on a topic which is very widely searched on on the web In this post i will share with you my experience on hacking and cracking, and will tell you steps you need to take to become a professional hacker . First of all i want to make one thing clear to you that hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course TIME. Everyone can become a Hacker provided they learn it from the basics. So if you wanna become a hacker, then all you need is a good source that will teach you hacking from the basics. What is a hacker? The term hacker has a double meaning within the field of computing. A hacker can be an expert computer programmer who creates complex software and hardware. These hackers are experts in the field of computing and have achieved a certain elite status within their field Types of hacker? 1.Black hat hackers: Black-hat hackers (also known as crackers) are the ones who write virii, destroy data, and deface websites along with other illegal activity. This type of hacker will not end up at a very good job due to a bad reputation, and usually ends up in jail for a long period of time. This kind of hacker is not welcome at HDNL White hat hackers: White hat hackers, also known as "ethical hackers," are computer security experts, who specialize in penetration testing, and other testing methodologies, to ensure that a company's information systems are secure. Such people are employed by companies where these professionals are sometimes called "sneakers Grey hat hackers: Grey-hat hackers are borderline white/black hats. They sometimes prank unsuspecting users and cause general mayhem. While they think this kind of activity is harmless, they may face long periods of jail time, and rejection HOW TO BECOME AN ETHICAL HACKER Snooping - This is when someone looks through your files in the hopes of finding something interesting whether it is electronic or on paper. In the case of physical snooping people might inspect your dumpster, recycling bins, or even your file cabinets; they can look under your keyboard for post-It-notes, or look for scraps of paper tracked to your bulletin board. Computer snooping on the other hand, involves someone searching through your electronic files trying to find something interesting. Interception - This can be either an active or passive process. In a networked environment, a passive interception might involve someone who routinely monitors network traffic. Active interception might include putting a computer system between sender and receiver to capture information as it is sent. From the perspective of interception, this process is covert. The last thing a person on an intercept mission wants is to be discovered. Intercept missions can occur for years without the knowledge of the intercept parties. Modification Attacks - This involves the deletion, insertion, or alteration of information in an unauthorized manner that is intended to appear genuine to the user. These attacks can be very hard to detect. The motivation of this type of attack may be to plant information, change grades in a class, alter credit card records, or something similar. Website defacements are a common form of modification attacks Denial of sercvice attack: A denial of service attack (DOS) is an attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the resources, so that no one can access it. If an attacker is unable to gain access to a machine, the attacker most probably will just crash the machine to accomplish a denial of service attack,this one of the most used method for website hacking. Dictionary attacks: A dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching likely possibilities. A dictionary attack uses a brute-force technique of successively trying all the words in an exhaustive list (from a pre-arranged list of values). In contrast with a normal brute force attack, where a large proportion key space is searched systematically, a dictionary attack tries only those possibilities which are most likely to succeed, typically derived from a list of words in a dictionary. Brute force attacks: Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find the password Common email hacking methods: A person cant become a professional hacker without knowing about common email hacking methods 1.Phishing 2.Keylogging 3.Javascripts 4.Bruteforce 5.Primary email adress hack http://www.facebook.com/home.php#!/pages/Dev-d-hacker-hacking-tips-/119997528061394 i thought to produce a post on a topic which is very widely searched on on the web In this post i will share with you my experience on hacking and cracking, and will tell you steps you need to take to become a professional hacker . First of all i want to make one thing clear to you that hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course TIME. Everyone can become a Hacker provided they learn it from the basics. So if you wanna become a hacker, then all you need is a good source that will teach you hacking from the basics. What is a hacker? The term hacker has a double meaning within the field of computing. A hacker can be an expert computer programmer who creates complex software and hardware. These hackers are experts in the field of computing and have achieved a certain elite status within their field Types of hacker? 1.Black hat hackers: Black-hat hackers (also known as crackers) are the ones who write virii, destroy data, and deface websites along with other illegal activity. This type of hacker will not end up at a very good job due to a bad reputation, and usually ends up in jail for a long period of time. This kind of hacker is not welcome at HDNL White hat hackers: White hat hackers, also known as "ethical hackers," are computer security experts, who specialize in penetration testing, and other testing methodologies, to ensure that a company's information systems are secure. Such people are employed by companies where these professionals are sometimes called "sneakers Grey hat hackers: Grey-hat hackers are borderline white/black hats. They sometimes prank unsuspecting users and cause general mayhem. While they think this kind of activity is harmless, they may face long periods of jail time, and rejection HOW TO BECOME AN ETHICAL HACKER Snooping - This is when someone looks through your files in the hopes of finding something interesting whether it is electronic or on paper. In the case of physical snooping people might inspect your dumpster, recycling bins, or even your file cabinets; they can look under your keyboard for post-It-notes, or look for scraps of paper tracked to your bulletin board. Computer snooping on the other hand, involves someone searching through your electronic files trying to find something interesting. Interception - This can be either an active or passive process. In a networked environment, a passive interception might involve someone who routinely monitors network traffic. Active interception might include putting a computer system between sender and receiver to capture information as it is sent. From the perspective of interception, this process is covert. The last thing a person on an intercept mission wants is to be discovered. Intercept missions can occur for years without the knowledge of the intercept parties. Modification Attacks - This involves the deletion, insertion, or alteration of information in an unauthorized manner that is intended to appear genuine to the user. These attacks can be very hard to detect. The motivation of this type of attack may be to plant information, change grades in a class, alter credit card records, or something similar. Website defacements are a common form of modification attacks Denial of sercvice attack: A denial of service attack (DOS) is an attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the resources, so that no one can access it. If an attacker is unable to gain access to a machine, the attacker most probably will just crash the machine to accomplish a denial of service attack,this one of the most used method for website hacking. Dictionary attacks: A dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching likely possibilities. A dictionary attack uses a brute-force technique of successively trying all the words in an exhaustive list (from a pre-arranged list of values). In contrast with a normal brute force attack, where a large proportion key space is searched systematically, a dictionary attack tries only those possibilities which are most likely to succeed, typically derived from a list of words in a dictionary. Brute force attacks: Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find the password Common email hacking methods: A person cant become a professional hacker without knowing about common email hacking methods 1.Phishing 2.Keylogging 3.Javascripts 4.Bruteforce 5.Primary email adress hack http://www.facebook.com/home.php#!/pages/Dev-d-hacker-hacking-tips-/119997528061394