PGP stands for ' Pretty Good Privacy ', which is a tool that uses public key encryption to protect email and data records, which is a highly secure form of encryption using MS_DOS, Unix, VAX / VMS and others.
Proxy, Proxy Server or Proxy Server (also 1), we can understand that another computer has the task of processing data, like an information converter of Internet signals. By connecting via one or more of the above servers, initially the user's computer - you will send request-request signals through the proxy server, where that information will be processed and returned. What you see every time you access the Internet.
Under this interpretation, the proxy acts as an intermediary between the computer you are using and the entire external Internet environment. Besides, Proxy is also used to filter, block websites, or more accurately, website content according to the needs of the government, service providers .
Unix is an operating system (like Windows). It is currently a strong and intimate operating system with the most Hacker. If you have become a true hacker, this OS is indispensable for you. It is used for support for C language programming.
Telnet is a program that allows you to connect to another computer via a port. All computers or servers (servers) have ports, here are some common ports:
For example: You can call Telnet to connect to mail.virgin.net on port 25.
First, when you call Unix, it will usually have a prompt: 'Log in:' , (however, only with this is not sure if it is Unix except that it appears in the previous message. 'log in:' as an example: Welcome to SHUnix. Please log in .).
Now that we are at the ' log in ' prompt, you need to enter a valid account. A normal account consists of 8 or more features, after you enter your account, you will see a password, try to enter Default Password and try the following table:
Account / Default Password
Root / Root
Sys / Sys / System / Bin
Bin / Sys / Bin
Mountfsy / Mountfsys
NuucAnon
Anon / Anon
User / User
Games / Games
InstallInstall
DemoDemo
GuestGuest
The most basic insights to becoming a Hacker - Part 2
Having fun!