Ethical Hacking
WHAT IS HACKING?
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
Hackers are most often programmers. As such, hackers obtain advanced knowledge of operating systems and programming languages. They might discover holes within systems and the reasons for such holes. Hackers constantly seek further knowledge, freely share what they have discovered, and never intentionally damage data.
A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets. Crackers can easily be identified because their actions are malicious.
1. Install Anti-Virus software and ensure that it’s regularly updated (If you do only one thing to help protect the safety of your computing environment, always take prompt advantage of software updates).
2. Anti-virus software isn’t enough – it’s also a good idea to install firewall (Good fences make good neighbors) software which will help prevent unauthorized incoming and outgoing communications from your computer while connected to the Internet.)
3.Passwords protect the settings on the software so no-one else can alter protection levels. Most anti-virus programs also offer some protection against Trojans, which aren’t actually a virus, but a small program that allows others to
control your computer.
4. Turn off your preview window in your email program. Some viruses, called worms, can infect your system without you clicking on attachments – just by you having your preview window open. Some worms can cause your sensitive information and documents to be transmitted to millions of people. Be very cautious in opening attachments,
even if it appears to come from someone you know – their system may be infected.
5. Disconnect your computer from the Internet when not in use. The longer you are connected to the Internet, the more opportunity you give for persons to gain unauthorized access.
6. If your computer is used by others, carry out regular examination of the software on it and research any software that you discover that you haven’t installed yourself. It’s safest to make it a policy not to allow any
software to be installed without your permission.
7. If you must store usernames and passwords on your system, ensure they are contained in a document that ispassword protected. It is not safe to store any passwords on your computer. Don’t let Windows “remember” passwords
for you. Passwords should always be more than 8 characters long and include upper and lower case letters, numerals,
symbols.
8. Ensure that you log out of online services properly. Failure to do so can allow others who use your computer to gain access to those services and you can be blamed for their activities.
9. Back up your files and store them away from your computer. Frequent backups just make good sense. The more virulent types of attacks damage or infect your hard drive and you can lose valuable personal information.
By backing up your data weekly you can help protect your important files, computer settings, and irreplaceable digital media.
USING GMAIL OFFLINE
------------------------------------------------------------
GMail introduced a new feature recently, that is browsing mails offline.
<<<<<<---------------------------------------------------------->>>>>>
Hacker vs Cracker
A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets. Crackers can easily be identified because their actions are malicious.
<<<<<<---------------------------------------------------------->>>>>>
9 Steps to help in keeping organization Secure
<<<<<<---------------------------------------------------------->>>>>>
The following are a few Anti-Hacking tips that will help in keeping your systems secure.
1. Install Anti-Virus software and ensure that it’s regularly updated (If you do only one thing to help protect the safety of your computing environment, always take prompt advantage of software updates).
2. Anti-virus software isn’t enough – it’s also a good idea to install firewall (Good fences make good neighbors) software which will help prevent unauthorized incoming and outgoing communications from your computer while connected to the Internet.)
3.Passwords protect the settings on the software so no-one else can alter protection levels. Most anti-virus programs also offer some protection against Trojans, which aren’t actually a virus, but a small program that allows others to
control your computer.
4. Turn off your preview window in your email program. Some viruses, called worms, can infect your system without you clicking on attachments – just by you having your preview window open. Some worms can cause your sensitive information and documents to be transmitted to millions of people. Be very cautious in opening attachments,
even if it appears to come from someone you know – their system may be infected.
5. Disconnect your computer from the Internet when not in use. The longer you are connected to the Internet, the more opportunity you give for persons to gain unauthorized access.
6. If your computer is used by others, carry out regular examination of the software on it and research any software that you discover that you haven’t installed yourself. It’s safest to make it a policy not to allow any
software to be installed without your permission.
7. If you must store usernames and passwords on your system, ensure they are contained in a document that ispassword protected. It is not safe to store any passwords on your computer. Don’t let Windows “remember” passwords
for you. Passwords should always be more than 8 characters long and include upper and lower case letters, numerals,
symbols.
8. Ensure that you log out of online services properly. Failure to do so can allow others who use your computer to gain access to those services and you can be blamed for their activities.
9. Back up your files and store them away from your computer. Frequent backups just make good sense. The more virulent types of attacks damage or infect your hard drive and you can lose valuable personal information.
By backing up your data weekly you can help protect your important files, computer settings, and irreplaceable digital media.
-------------------------------------------------------------------------------
GMail introduced a new feature recently, that is browsing mails offline.
Today we are going to see how to do that.
First you need to install Google Gears, you can download the online installer from
http://gears.google.com/
http://gears.google.com/
Run the online installer and it will install Google Gears on your system.
Now open your GMail and navigate to the settings and then to the Labs tab, there you will find a feature called offline, Enable this.
you are almost done, just a few clicks away. It will ask your permission to install offline access for GMail, click next.
Then you get a Google Gears security warning, allow it.
Click OK
In the next window and you are done.It will download all your mails to your hard drive for offline browsing.
You can see the status in the status window.
----->Have fun browsing gmail Offline.<-----
------------------------------------------------------------
Best And 100% Tested Proxy Sites
------------------------------------------------------------
www.kproxy.com
http://www.shadow.com/
http://miss.info/
http://4proxy.com/
http://conqueror.info/
https://proxify.com/
http://www.morepress.info/
http://nyclife.org/
http://www.pagewash.com/
------------------------------------------------------------
www.kproxy.com
http://www.shadow.com/
http://miss.info/
http://4proxy.com/
http://conqueror.info/
https://proxify.com/
http://www.morepress.info/
http://nyclife.org/
http://www.pagewash.com/
Wow - that looks amazing!! Love love love it. You are killing that to do list.
ReplyDeleteEthical Hacking Course in Chennai