hacker-jk
hacker-jk
hacker-jk
2 posts
Don't wanna be here? Send us removal request.
hacker-jk · 5 years ago
Text
WHAT IS HACKING ?? FOR BEGINNER
WHAT IS HACKING???
Ans: It is important to lay the groundwork for a proper introduction to computer
hacking by first discussing some commonly used terms and to clear up any
ambiguities with regard to their meanings. Computer professionals and
serious hobbyists tend to use a lot of jargon that has evolved over the years in
what had traditionally been a very closed and exclusive clique. It isn’t always
clear what certain terms mean without an understanding of the context in
which they developed. Although by no means a complete lexicon, this
chapter introduces some of the basic language used among hackers and
computer security professionals. Other terms will appear in later chapters
within the appropriate topics. None of these definitions are in any way
“official”, but rather represent an understanding of their common usage.
This chapter also attempts to clarify what hacking is as an activity, what it
is not, and who hackers are. Depictions and discussions of hacking in popular
culture can tend to paint an overly simplistic picture of hackers and of
hacking as a whole. Indeed, an accurate understanding is lost in the
translation of buzzwords and popular misconceptions.
Hacking & Hackers
The word hacking normally conjures images of a lone cyber-criminal,
hunched over a computer and transferring money at will from an
unsuspecting bank, or downloading sensitive documents with ease from a
government database. In modern English, the term hacking can take on
several different meanings depending on the context. As a matter of general
use, the word typically refers to the act of exploiting
computer security vulnerabilities to gain unauthorized access to a system.
However, with the emergence of cybersecurity as a major industry, computer
hacking is no longer exclusively a criminal activity and is often performed bycertified professionals who have been specifically requested to assess a
computer system’s vulnerabilities (see the next section on “white hat”, “black
hat”, and “gray hat” hacking) by testing various methods of penetration.
Furthermore, hacking for the purposes of national security has also become a
sanctioned (whether acknowledged or not) activity by many nation-states.
Therefore, a broader understanding of the term should acknowledge that
hacking is often authorized, even if the intruder in question is subverting the
normal process of accessing the system.
Even broader use of the word hacking involves the modification,
unconventional use, or subversive access of any object, process, or piece of
technology - not just computers or networks. For instance, in the early days
of hacker subculture it was a popular activity to “hack” payphones or vending
machines to gain access to them without the use of money - and to share the
instructions for doing so with the hacking community at large. The simple act
of putting normally discarded household objects to new and innovative uses
(using empty soda cans as pencil holders, etc.) is often referred to as hacking.
Even certain useful processes and shortcuts for everyday life, like using to-do
lists or finding creative ways to save money on products and services, are
often referred to as hacking (often called “life hacking”). It is also common to
encounter the term “hacker” in reference to anyone who is especially talented
or knowledgeable in the use of computers.
This book will concentrate on the concept of hacking that is specifically
concerned with the activity of gaining access to software, computer systems,
or networks through unintended means. This includes the simplest forms of
social engineering used to determine passwords up to the use of sophisticated
hardware and software for advanced penetration. The term hacker will thus
be used to refer to any individual, authorized or otherwise, who is attempting
to surreptitiously access a computer system or network, without regard to
their ethical intentions. The term cracker is also commonly used in place of
hacker – specifically in reference to those who are attempting to break
passwords, bypass software restrictions, or otherwise circumvent computer
security.
5 notes · View notes
hacker-jk · 5 years ago
Text
HISTORY OF THE INTERNET
IN 1969,THE DEPARTMENT OF DEFENSE (DOD) O0F THE UNITED STATES OF AMERICA STARTED A NETWORK CALLED THE ADVANCED RESEARCH PROJECTS AGENCY NETWORK(ARPANET).IT WAS STARTED WITH ONE COMPUTER IN  CALIFONIA AND THREE IN UTAH.
LATER,THE MILITARY ALLOWED UNIVERSITITIES TO JOIN THE NETWORK FOR SHARING HARDWARE AND SOFTWARE RESOURCES.THE NETWORK GREW BIGGER AND BIGGER GIVING BIRTH TO THE PRESENT-DAY INTERNET.
2 notes · View notes