Posts

Showing posts with the label hacking

What is Footprinting ?

What is footprinting ? What is Footprinting ? The systematic footprinting of an organization will allow attackers to create a complete profile of an organization’s security posture. By using a combination of tools and tech- niques, attackers can take an unknown quantity (Widget Company’s Internet connec- tion) and reduce it to a specific range of domain names, network blocks, and individual IP addresses of systems directly connected to the Internet. While there are many types of footprinting techniques, they are primarily aimed at discovering information related to these technologies: Internet, intranet, remote access, and extranet. Table 1-1 depicts these technologies and the critical information an attacker will try to identify. Why Is Footprinting Necessary? Footprinting is necessary to systematically and methodically ensure that all pieces of in- formation related to the aforementioned technologies are identified. Without a sound methodology f

What is hacking , what is hacker

What is hack hacking hackers ? What's Hack ,Hacking and Hacker? The only meaning that hack held for me in regard to computers was as a verb meaning “to illegally enter a computer system.” I too was surprised to come across headlines like the following: How did hack go from “illegal computer activity” to “a tip for making things easier to do”? Looking a little further, I find that hack and hacking to connote only malicious unauthorized access to computer files may reflect general usage, but not that of programmers who are proud to be known as “hackers.” The OED has ten entries for the word hack: five as a noun, four as a verb, and one as a combining form. The verb hack in the sense of “to cut with heavy blows” has been in the language since the early 13th century, but the use of hack in the context of computer programming dates from the 1970s. Note: Hack in the sense of “to cope with” dates from 1955: “I can’t hack all this extra work.” The etymology of the comp