Ethical Hacking
Results 1 to 2 of 2

Thread: Ethical Hacking

  1. #1
    Senior Member
    Join Date
    Jun 2003

    Ethical Hacking

    This is my first tutorials for newbies... to tell them there can be a hacking that can be totally ethical (without any wrong purpose)...

    The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers.

    But what exactly is Hacking? Hacker is a person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary.

    The various kinds of hackers are code freaks, crackers, cypherpunks and phreakers. A clever hacker has knowledge of all the above areas but will specialize in one.

    Crackers find the door, code freaks provide the tools to open the door, cyberpunks provide the combination required to crack it open, and the phreakers cover the tracks.

    Code freaks take apart other peoples programs, see how they work, and put them back together with a few changes.

    Crackers break into computer systems. Operating systems and their security are their special target. Cypherpunks have a significant level of skill in cryptography. Whereas, Phreakers are specialist in the art of using phone systems.

    The various types of attacks are password-based attacks, attacks that exploit trusted access, IP spoofing, session hijacking, packet sniffing, attacks that exploit technology vulnerabilities, and attacks that exploit shared libraries.

    What is ethical hacking?
    With the growth of the Internet, computer security has become a major concern for businesses and governments. They want to be able to take advantage of the Internet for electronic commerce, advertising, information distribution and access, and other pursuits, but they are worried about the possibility of being “hacked.” At the same time, the potential customers of these services are worried about maintaining control of personal information that varies from credit card numbers to social security numbers and home addresses.

    Ethical hackers typically have very strong programming and computer networking skills and have been in the computer and networking business for several years. They are also adept at installing and maintaining systems that use the more popular operating systems.
    Now is the moment, or NEVER!!!

  2. #2
    Join Date
    Jun 2003
    Ugh.... Your Tutorial is a little lacking IMHO. It also seems like at the end you just cut off. Like you don't finish it. There is ALOT more that can be said. First you could go into detail on each. The detail that you gave on what each one does was rather limited. (Not very acurate either IMHO.)

    You could put alot more into this Tutorial. It seems as if you woke up and said let's right something and wrote it in like 5 minutes and posted it.

    If you need more info there are plenty of sources out there. One you could use google. Two ask around.

    But I must be honest wtf was that?


    Here if you need help writing it get someone to help you. If you need help send it to me I will help you work on it. but that was not very good IMHO.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts