Trojan : It is easy to understand, this is a spy program installed on someone else's computer to steal the documents on the computer and send it to its owner. What it steals can be a password, an accourt or a cookie . depending on who wants it installed.
Virus : It is easy to understand that this is a program with special codes installed ( or spread from another device ) on the victim's machine and performing the requirements of that code, most viruses are used to destroy data or computer.
Worm : This is a standalone program that can replicate itself and spread throughout the network. Just like a virus, it can also damage data or it can destroy inside the network, even cracking that network.
Logicbomb : A program that sends a lot of data packets to the same address at the same time, flooding the system, blocking traffic lines (on the server) or using it as a tool to ' terrorize ' the enemy.
6. What is PGP?
PGP stands for ' Pretty Good Privacy ', which is a tool that uses public key encryption to protect email and data records, which is a highly secure form of encryption using MS_DOS, Unix, VAX / VMS and others.
7. What is a proxy?
Proxy, Proxy Server or Proxy Server (also 1), we can understand that another computer has the task of processing data, like an information converter of Internet signals. By connecting via one or more of the above servers, initially the user's computer - you will send request-request signals through the proxy server, where that information will be processed and returned. What you see every time you access the Internet.
Under this interpretation, the proxy acts as an intermediary between the computer you are using and the entire external Internet environment. Besides, Proxy is also used to filter, block websites, or more accurately, website content according to the needs of the government, service providers .
Read on to find out more about what Proxy is!
8. What is Unix?
Unix is an operating system (like Windows). It is currently a strong and intimate operating system with the most Hacker. If you have become a true hacker, this OS is indispensable for you. It is used for support for C language programming.
9. What is Telnet?
Telnet is a program that allows you to connect to another computer via a port. All computers or servers (servers) have ports, here are some common ports:
Port 21: FTP
Port 23: Telnet
Port 25: SMTP (Mail)
Port 37: Time
Port 43: Whois
For example: You can call Telnet to connect to mail.virgin.net on port 25.
10. How do I know if I have Telnet to Unix system?
First, when you call Unix, it will usually have a prompt: 'Log in:' , (however, only with this is not sure if it is Unix except that it appears in the previous message. 'log in:' as an example: Welcome to SHUnix. Please log in .).
Now that we are at the ' log in ' prompt, you need to enter a valid account. A normal account consists of 8 or more features, after you enter your account, you will see a password, try to enter Default Password and try the following table:
Account / Default Password Root / Root Sys / Sys / System / Bin Bin / Sys / Bin Mountfsy / Mountfsys NuucAnon Anon / Anon User / User Games / Games InstallInstall DemoDemo GuestGuest
How to retrieve a hacked Facebook account
Why is Facebook account hacked?
Instructions to "hack" into Administrator account on Windows 7
The most basic insights to becoming a Hacker - Part 2
in recent weeks, the lapsus$ hacker group has appeared in the media. security researchers are actively investigating the activities of the lapsus$ hacker group.
anonymous hacker simulator is a simulation game, allowing you to transform into a professional white hat hacker with the mission to uncover the conspiracy behind the civil data surveillance program of a dark organization.
by this chapter, you have a few basic insights about unix systems and some of its basic commands. this chapter will briefly discuss some of the basic but important utilities of unix utilities that you will use in your daily activities.
have you ever imagined yourself in the role of a hacker? one way to do that is through a hacking emulator. through these emulators, you can experience the scenarios and challenges that a hacker faces today.
in part 1, we have provided you with information about seo and keywords. in part 2, we will continue to provide the next most basic concepts and elements about seo.
the cover image of facebook hacker will help you have more motivation to continue learning to become a hacker. in this article, software tips will send you the most beautiful and varied facebook hacker cover images in many different ways.
after shaking hands with the government to uncover the world's leading hacker organization, he has a long journey full of sweat and tears fleeing his past.
raidforum, one of the largest black hat hacker forums where hackers buy and sell data, has had its domain name seized and has been inaccessible since late february.