Home
  GUESTBOOK
  CHAT ROOM
  SOFTWARE
  PC MAINTANCE
  COMPUTER TRICKS
  E-BOOKS LINKS
  ALL ABOUT GOOGLE
  HACKING ZONE
  => Learn Hacking
  => Hack your Modem
  USEFUL WEBSITES
  FORUM
  MESSENGER TRICKS
  Register Here and Exchange Traffic
  Just for your Knowledge
  7 reason why world will end in 2012
  2012 phenomenon
Copyright © 2010 ayushworld Inc. All rights reserved.
HACKING ZONE
 

Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works.
What are Hackers?

Technically, a hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer. Under such a definition, I would gladly brand myself a hacker. However, most people understand a hacker to be what is more accurately known as a 'cracker'
 
 
What are Crackers?

Crackers are people who try to gain unauthorized access to computers. This is normally done through the use of a 'backdoor' program installed on your machine. A lot of crackers also try to gain access to resources through the use of password cracking software, which tries billions of passwords to find the correct one for accessing a computer.
 
 
What damage can a Hacker do?

This depends upon what backdoor program(s) are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information
 
 
How do Hackers hack?

There are many ways in which a hacker can hack. Some are as follows –

NetBIOS

ICMP Ping

FTP

rpc.statd

HTTP
 
NetBIOS

NetBIOS hacks are the worst kind, since they don't require you to have any hidden backdoor program running on your computer. This kind of hack exploits a bug in Windows 9x. NetBIOS is meant to be used on local area networks, so machines on that network can share information. Unfortunately, the bug is that NetBIOS can also be used across the Internet - so a hacker can access your machine remotely.
 
ICMP ‘Ping’ (Internet Control Message Protocol)

ICMP is one of the main protocols that make the Internet work. It standards for Internet Control Message Protocol. 'Ping' is one of the commands that can be sent to a computer using ICMP. Ordinarily, a computer would respond to this ping, telling the sender that the computer does exist. This is all pings are meant to do. Pings may seem harmless enough, but a large number of pings can make a Denial-of-Service attack, which overloads a computer. Also, hackers can use pings to see if a computer exists and does not have a firewall (firewalls can block pings). If a computer responds to a ping, then the hacker could then launch a more serious form of attack against a computer.
 
FTP (File Transfer Protocol)

FTP is a standard Internet protocol, standing for File Transfer Protocol. You may use it for file downloads from some websites. If you have a web page of your own, you may use FTP to upload it from your home computer to the web server. However, FTP can also be used by some hackers...  FTP normally requires some form of authentication for access to private files, or for writing to files
FTP backdoor programs, such as-

Doly Trojan

Fore

Blade Runner
simply turn your computer into an FTP server, without any authentication.
 
Rpc.statd

This is a problem specific to Linux and Unix. The problem is the infamous unchecked buffer overflow problem. This is where a fixed amount of memory is set aside for storage of data. If data is received that is larger than this buffer, the program should truncate the data or send back an error, or at least do something other than ignore the problem. Unfortunately, the data overflows the memory that has been allocated to it, and the data is written into parts of memory it shouldn't be in. This can cause crashes of various different kinds. However, a skilled hacker could write bits of program code into memory that may be executed to perform the hacker's evil deeds.
 
HTTP – HTTP stands for HyperText Transfer Protocol..

HTTP hacks can only be harmful if you are using Microsoft web server software, such as Personal Web Server. There is a bug in this software called an 'unchecked buffer overflow'. If a user makes a request for a file on the web server with a very long name, part of the request gets written into parts of memory that contain active program code. A malicious user could use this to run any program they want on the server.

 
 
 
  There are no links entered yet!

You want your link here?
Just register here:
=> To the registration
 
Best Moments in Life  
  1)Falling In love

2)Laughing till your Stomach Hurts

3)Enjoying a ride down the country side

4)Listening to your favorite song on the radio

5)Getting to sleep listening to the rain pouring outside

6)Getting out of the shower and wrapping yourself with warm, fuzzy towel

7)Passing your final exams with good grades

8)Being a part of an interesting conversation

9)Finding some money in your old pants

10)Laughing at yourself

11)Sharing a wonderful dinner with all your friends

12)Laughing without a reason

13)"Accidentally" hearing someone saying something good about you

14)Watching a sunset

15)Listening to a song that remind you of a important person in your life

16)Receiving or giving your first kiss

17)Feeling this movement in your body when seeing this "special" someone

18) Having a great time with your friends

19)Seeing the one you love happy

20)Wearing the shirt of a person you love and smelling his/her perfume

21)Visiting an old friend of yours and remembering great memories

22) Hearing some telling you "I LOVE YOU "

"True Friends come in the good times when we tell them to ... and come in bad times ............................without calling ..."
 
This website was created for free with Own-Free-Website.com. Would you also like to have your own website?
Sign up for free