Hacker Acronyms -2016


Although there are vast number of abbreviations in hacking field,but I tried my best to put them here.

• Back door – A hole deliberately placed by designers into a security system. Hackers use back doors to get into a system.

• Bit bucket – The universal data dump. Lost, deleted, or destroyed data ends up here.

• Black hat – A criminal hacker who causes damage and breaks the law by hacking.

• Cracker – someone who breaks into a security system. Many hackers separate themselves from
crackers because crackers are often tied to organized crime rings.

• Daisy-chaining – process where a hacker gains entry into a computer or network and then uses it to gain access to another.

• Deep magic – A special technique central to a program.

• Hacker – A person who is able to break into a computer’s system with or without permission.

• Hacking run – A hacking session that lasts in an excess of eight to ten hours.

• Foo – Term used as a sample name for programs and files when the developer can’t think
of anything else.

• Gray hat – A hacker who sometimes hacks
illegally and sometimes hacks \“legally\”.

• KISS Principle – Acronym for “Keep It Simple Stupid”, used to control development complexity
by hackers.

Kluge – A clever programming trick that works for the wrong reason.

• Lots of MIPS but no I/O – describes a system that has a lot of processing power, but a bottlenecked input/output.

• Munge – A rewrite of a routine, data structure, or whole program.

Netiquette – The standards of politeness across the internet; not often observed by hackers.

Phreaking – The science of cracking a phone network.

• Script kiddie – A “copycat hacker” who copies other hacker’s techniques without creating anything of their own.

• Security through obscurity – hacker term for a common way of dealing with security holes where
they are ignored and not documented with the hope nobody finds them.

• Sneaker – An individual hired to break into places with the purpose of testing their security.

• Spaghetti code – code that has a complex and tangled control structure.

• Time bomb – program that is set to trigger once certain conditions are reached.

• Trojan horse – program that disguises itself as one thing but once inside a computer, it actually
does something else. Most often, they are damaging (viruses).

• White hat – A hacker who is considered “nice” i.e. when he hacks, he informs the owner he has
done it.

• Vaporware – term used by hackers referring to products released in advance of their official release date.

Wetware – phrase referring to humans on the other end of a computer system.

• Virus – A self-replicating program that inserts itself into computer systems and causes damage.

• Voodoo programming – The use by guess of an obscure system that someone doesn’t really
understand; i.e., whether it works or doesn’t work, the user has no real idea why.

• Vulcan nerve pinch – A keyboard combination that forces a soft-boot.

• Wedged – A point where a system is stuck; different from a crash, where the system is nonfunctioning.

• Wizard – person who completely understands how a program or process works.

BotNet: is a network of computer you have established using malware on many computers with your inflicted by you, controlled by you.

• R.A.T. = Remote admin tool: A way to control other computers from yours and execute many different functions.

Xss = Cross-site-Scripting and is a web hacking method where you inject HTML or JavaScript on
the web-page. This attack can be done by submitting queries into text boxes or simply in the URL.

• Key loggers : Malware which is Constantly recording the infected computers Keystrokes and
then sends you logs via E-mail or FTP.

• VPN = Virtual private network: A private Network which will completely hide your IP.

VPS = Virtual private Server: A virtual private server is one of many virtual machines running on a single computer.They are often used by Internet hosting services. Although a VPS runs in software on the same physical computer as other
customers

• DOS: Denial of Service is an attempt to make a machine or network resource unavailable to its
intended users usually down by one machine.

DDOS: Distributed Denial of Service is the same thing as DOS but from multiple systems

• SQL: structured query language is a query language used for accessing and modifying information in a database.

• Cookie logger: cookie logger is used to log the targets cookies then sends it to you Via E-mail or ftp

• Malware: Malware, short for malicious (or malevolent) software, is software used or created
by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software.
Malware is a general term used to refer to a variety of forms of hostile or intrusive software.

vira – ‘vira’ cannot spread without the help of us humans. They are like parasites because they need
a host to attach themselves to. The host is usually a legitimate looking program or file. Once this program is launched, the virus is executed and
infects other files on your computer. vira can be very destructive. They can do damage to your computer hardware, software and files. vira are
spread through the sharing of files and are many times sent within emails via attachments.

• Worms – A worm is a malicious program that can replicate itself onto other computers on a
network. Unlike a virus, worms don’t need a human to be able to spread and infect systems. Once it infects a system, it uses that system to
send out other copies of itself to other random systems attempting to infect them.

• Trojan Horse – A trojan horse is a maliciousprogram that can be used to do silly things to a system like changing its desktop, mess with the
user interface, and take control of your mouse. It can also be used for some serious things like accessing your data, erasing your files, stealing
your passwords, and capturing your keystrokes.

• Logic Bombs – Logic bombs are usually pieces of code that are programmed into a program that
lie dormant until a certain time or until a user does a certain action which causes it to be executed.
When it is triggered it performs a certain function that the program wasn’t intended to do.

• Bacteria – Bacteria make many copies of themselves and eventually end up taking up all of
the computers resources such as all of its processor power, memory and disk space. This results in the legitimate user losing access to
those resources.

Rootkit :The malware most likely to have a human touch, rootkits are installed by crackers (bad
hackers) on other peoples computers. he rootkit is
designed to camouflage itself in a systems core processes so as to go undetected. It is the hardest
of all malware to detect and therefore to remove; many experts recommend completely wiping your
hard drive and re installing everything fresh.

• Adware are the programs which delivers ads to your computer (generally in POP-UPs form). They
consume your network bandwidth and slow it down.

Wabbits: According to Wikipedia, wabbits are in act rare, and its not hard to see why: they dont do anything to spread to other machines. A wabbit, like a virus, replicates itself, but it does not have
any instructions to email itself or pass itself through a computer network in order to infect
other machines. The least ambitious of all malware, it is content simply to focus on utterly devastating a single machine.

• Blended Threats – Blended threats combine all of the characteristics of the above and use them
along with system vulnerabilities to spread and infect machines.

Zero day exploit- A zero day vulnerability refers to a hole in
software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack.

If I have missed anyone just comment here I will add into the post.Don't forget to share guys.

All About Hacking-2016

What is hacking?

There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.

 Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking.

 

Types of hackers:-

Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.

Ethical Hacker (White hat):A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments.

Cracker (Black hat):A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.

Grey hat:A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.

Script kiddies:A non-skilled person who gains access to computer systems using already made tools.

Hacktivist:A hacker who use hacking to send social, religious, and political etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.

Phreaker:A hacker who identifies and exploits weaknesses in telephones instead of computers.

What is Cybercrime?

Cybercrime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers etc.  Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using phones via SMS and online chatting applications.

Type of Cybercrime

The following list presents the common types of cybercrimes:

Computer fraud: Intentional deception for personal gain via the use of computer systems.

Privacy violation:Exposing personal information such as email addresses, phone number, account details etc. on  social media, websites etc.

Identity Theft:Stealing personal information from somebody and impersonating that person.

Sharing copyrighted files/information:This involves distributing copyright protected files such as eBooks and computer programs etc.

Electronic funds transfer:This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.
Electronic money laundering:This involves the use of computer to launder money.

ATM Fraud:This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.
Denial of Service Attacks:This involves the use of computers in multiple locations to attack servers with a view of shutting them down.

Spam:Sending unauthorized emails. These emails usually contain advertisements.
 
Carding:Carding is online and illegal way of ordering anything free of cost in fact they hack credit card and used them to pay online.

What is ethical hacking?

Ethical hacking is identifying weakness in computer systems and/or computer networks and coming with counter measures that protect the weaknesses. Ethical hackers must abide by the following rules.

Get written permission from the owner of the computer system and/or computer network before hacking.
Protect the privacy of the organization been hacked.
Transparently report all the identified weaknesses in the computer system to the organization.
Inform hardware and software vendors of the identified weaknesses.

Why ethical hacking?

Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money.
Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.

Summary

Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.
Cybercrime is committing crime with the aid of computers and information technology infrastructure.
Ethical hacking is about improving the security of computer systems and/or computer networks.
Ethical hacking is legal.
 

HOW TO CHANGE YOUR IP ADDRESS WITHIN 10 SECONDS-2016

Hi guys ,in today's post I will talk about what is IP address,how to know your current IP address and finally how to change your IP address.

So Lets move on to our first topic 'what is an IP address?'.

In short ,IP address is your online identity. Whenever you are surfing the net your IP address is used to identify your identity.Moreover your ip address is traced or you can say ,the record of you IP address is stored in the website data server.

With the help of IP address,anyone can find you geo-location.

Let's move on to our next question 'How to know your current IP address?'
In the very first post of this blog I have answered it very easily .You can find your current IP address within 10 seconds .Click here to read How to Know your Current IP address

Now the last question 'How to hide or change your IP address?'

The fastest answer to hide you IP address is VPN.

Now what is a VPN?
VPN stands for VIRTUAL PRIVATE NETWORK.Just for now just search on google  (free VPN download) and download any of them .

Mostly I prefer are:-

Hotspot shield
Cyberghost
Finch VPN
Droid VPN
Tunnel bear

Some of them are for android and some are of them are for PC .It doesn't matter just download and sign up as respective and choose any free server and connect them and just wait for 10 secs.You will see a successful connect message.

Yipee now you have an different IP address.Now don't ask what is need to hide our IP address .You are here so I guess you know the answer of this question.

And in the next post I will explain more about VPN.

If you liked this post do me a favour share it with your friends.

HOW TO KNOW YOUR IP ADDRESS WITHIN 10 SECONDS-2016

Hi guys,This is the very first post of this blog.In this post we are going to start with most common issue how to know your IP ADDRESS (within 10 seconds)

Although may noobs knows how to find their IP address.But this is the easiest way to find out your current IP address within 15 seconds.

So let's start how to find you IP address.Follow the following steps to know it:-

1). Open any browser.
2). In the URL bar type Check2ip.com and search it.
  ( or just click the link)
3). And wait to load the website.
4).Boom there you will know you Information related to your internet connection including IP address and ISP

It hardly takes more than 10 seconds even if you have 2G speed.

Thanks for tonight.I'll we right back with new topic guys.