There are many numbers of hacking techniques available and each hacking attempt happens for a malicious purpose. The word hacker means attacker who assault on the computer’s system security. Not all the hackers have the intention to steal others’ things. Hacking can be done on several places like a website, wireless connection, broadcasting networks, emails, gadgets like mobile phones, etc. Hackers make use of computer viruses or other dangerous hacking software that helps them gain access to confidential documents present on unauthorized systems.
Type of hacking
Legal hacking or White hat - Hacking done intentionally to check for vulnerabilities in their system.
Black hat – Hacking done to steal others’ confidential information.
Grey hat – Combination of both the above. They make use of legal access to steal unauthorized data.
Blue hat – Delegating authority to a third person to check for bugs in your own system.
Elite – Expert hackers are referred as Elite hackers.
Script kiddie – Amateur hacker who uses others ideas and software for hacking.
Neophyte – Almost new to internet fundamentals.
Hacktivism – Spreading their beliefs in the form of message via the hacked system to others.
Phreaker – Telecomm hacker who tricks plays with the telephone and making you do free ISD calls.
Computer Security Hacker – hacker knowing the tech spec of computer security and networking. Using fragmented packets to attack the firewall or ISP.
Academic Hacker – Academic person doing a research about hacking.
Hobby Hacker – Hacking done as a hobby like jail breaking done on Apple iPhones, modifying software and hardware, etc.
Hacking tips
Following are the tips to keep off hacker’s interruption.
1.Try to avoid usage of wireless networks and turn off your Wi-Fi and Bluetooth devices. Use wired network only with managed firewalls.
2.Never use wireless technologies like Bluetooth and Wi-Fi in Public Areas,
3.The password you use for each account should be unique. Even if someone manages to find your password of a particular account, you could limit the damages to that account alone.
4.To avoid dictionary attacks and brute force attack, be sure to use complex passwords that are combination of letters, numbers and special characters, and must be more than 10 characters long.
5.Never use others’ system to log into your accounts, beware of the software like keylogger, abel, etc.
6.When using others system, be sure to download Spybot software to see if there are any security holes and then begin using their system.
7.You password must be changed frequently and periodically.
8.Check your antivirus for frequent updated for virus threats, malware removal, adware removal and prevention.
In order to stay safe against hacking, you must know the way hacking works. You can browse the internet for hacking guides, hacking software, hacking methods and do some academic research on those topics. Hackers usually use malware to attack the system and create paths for them to enter and steal the valuable information stored on the systems. A lot of expert hackers write their own software and use their own technique to perform hacking, and thus making it tough for us tracks them down. All you can do is follow the above guidelines and make use effective security related application programs like antivirus (Norton, McAfee, etc), Spyware (STOPzilla Spyware remover), etc and stay protected against malware.
Type of hacking
Legal hacking or White hat - Hacking done intentionally to check for vulnerabilities in their system.
Black hat – Hacking done to steal others’ confidential information.
Grey hat – Combination of both the above. They make use of legal access to steal unauthorized data.
Blue hat – Delegating authority to a third person to check for bugs in your own system.
Elite – Expert hackers are referred as Elite hackers.
Script kiddie – Amateur hacker who uses others ideas and software for hacking.
Neophyte – Almost new to internet fundamentals.
Hacktivism – Spreading their beliefs in the form of message via the hacked system to others.
Phreaker – Telecomm hacker who tricks plays with the telephone and making you do free ISD calls.
Computer Security Hacker – hacker knowing the tech spec of computer security and networking. Using fragmented packets to attack the firewall or ISP.
Academic Hacker – Academic person doing a research about hacking.
Hobby Hacker – Hacking done as a hobby like jail breaking done on Apple iPhones, modifying software and hardware, etc.
Hacking tips
Following are the tips to keep off hacker’s interruption.
1.Try to avoid usage of wireless networks and turn off your Wi-Fi and Bluetooth devices. Use wired network only with managed firewalls.
2.Never use wireless technologies like Bluetooth and Wi-Fi in Public Areas,
3.The password you use for each account should be unique. Even if someone manages to find your password of a particular account, you could limit the damages to that account alone.
4.To avoid dictionary attacks and brute force attack, be sure to use complex passwords that are combination of letters, numbers and special characters, and must be more than 10 characters long.
5.Never use others’ system to log into your accounts, beware of the software like keylogger, abel, etc.
6.When using others system, be sure to download Spybot software to see if there are any security holes and then begin using their system.
7.You password must be changed frequently and periodically.
8.Check your antivirus for frequent updated for virus threats, malware removal, adware removal and prevention.
In order to stay safe against hacking, you must know the way hacking works. You can browse the internet for hacking guides, hacking software, hacking methods and do some academic research on those topics. Hackers usually use malware to attack the system and create paths for them to enter and steal the valuable information stored on the systems. A lot of expert hackers write their own software and use their own technique to perform hacking, and thus making it tough for us tracks them down. All you can do is follow the above guidelines and make use effective security related application programs like antivirus (Norton, McAfee, etc), Spyware (STOPzilla Spyware remover), etc and stay protected against malware.
0 comments
একটি মন্তব্য পোস্ট করুন