Hacking and Cracking Activity at a Glance

In general hacking activity is any business or activity outside the permit orowner's knowledge network to tap into a network and trying to steal filessuch as password files and so on. Or attempt to manipulate the data, steal filesimportant or embarrass someone else by falsifying its user identity. The culprit is calledconsisting of a hacker or group of people who continuously strive topenetrate the security system of the operating system work on a computer network. The hackersexperienced can immediately find out the weakness of security systems(Security holes) in a computer network system. In addition hacker habit is to continuesearch for new knowledge or new targets and they will mutually inform eachother. But basically the true hacker never intended to destroy datawithin the network, they are just trying to conquer a system capabilitycomputer security for the satisfaction of its own. While a person or group of people whointentionally intend to undermine and destroy the integrity of the entire networkcomputer system called a cracker, and his actions is called cracking. In general, thecracker after a successful entry into the computer network will perform the activitiesdestruction and the destruction of important data (destroying data) to causeconfusion for the user in using the computer. Activities of the cracker orcyberterrorist is easily recognizable and can be known from the impact of the results of activities7they do. Some of the methods or the way work is often used by cyber terrorists andhackers, among others:• Spoofing, which is a form of counterfeiting operation in which a hacker or cyberterrorist falsified (to masquerade) the identity of a user until he succeeded inIllegal logon or log onto one computer network such as if a real user.• Scanner is a program that will automatically detect weaknesses(Security Weaknesses) a computer on a local computer (local host) orcomputer network with remote locations (remote host). Thus by usingThis program is a hacker who may be physically located in the UK canWeaknesses easily find security in a server in the United States ordibelahan world, including in Indonesia without having to leave the room!.• Sniffer, is another word for Network Analyser which serves as a tool formonitor the computer networks. This tool can be operated virtually in all types of protocolsdata communication, such as: Ethernet, TCP / IP, IPX and others.• Password Cracker, is an encryption program that can open apassword or otherwise can even turn off the password security systemits own.• Destructive Devices, is a set of programs tailor-made virusto perform data destruction, including Trojan horses, Worms, EmailBombs, Nukes and others.

Posted in , , . Bookmark the permalink. RSS feed for this post.

Leave a Reply

Pages

Search

Sandiah Notes Template Sandroid11.blogspot.com.