Be Hacker - Volume 1 (Starter) by Tony Stark - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

Introduction

Consider when you are downloading free software or anything from internet or put a pendrive on your laptop, however , suddenly your system shutting down or not responding. Now you can think what is the problem? My laptop has 16 GB RAM, i7 Processor and I have done all my defragmentation and cleaned cookies. This is called malfunction of the system.

You have to believe most of the laptop are giving way to hackers. Because of people think they have enough security. People are thinking that nothing information from laptop. But that nothing would be the important to hackers.

Do you believe? Some of the Trojans are may corrupt your disk and there is no way to repair. The source of that Trojans is surely a web. Something on the web force you to download a fake antivirus software. Finally, they can control your full system function. So that laptop may restarting, Not responding, Network failure, Continuous ads on web, porn websites continuously top of the page or hardware failure.

Do you believe? Worms can spread, even if you not click it. Email attachments are the prime place to spread. Before you download some attachments, must check that mail from trusted web source, Otherwise, don’t download. If you want to download, after check that file on www.virustotal.com

Computer security is important for protecting the confidentiality and availability of computer systems and their resources. Computer administration and management have become more complex which produces more attack avenues. Network environments and network-based applications provide more attack paths.

Evolution of technology has focused on the ease of use while the skill level needed for exploits has decreased.

What you may loss because of the attacks?

img1.png Financial Loss

img1.png Data Loss

img1.png Misuse of your system and Loss of Trust

Types of security

img1.png Software and Hardware

img1.png Communication

img1.png Information

Top Ten Most-Destructive Computer Viruses

img1.png Stuxnet (2009-2010)

img1.png Conficker Virus (2009)

img1.png agent.btz (2008)

img1.png Zeus (2007

img1.png PoisonIvy (2005)

img1.png MyDoom (2004)

img1.png Fizzer (2003)

img1.png Slammer (2003)

img1.png Code Red (2001)

img1.png Love Letter/I LOVE YOU (2000)

Top Ten Most-Destructive Computer Viruses

img1.png NetBus

img1.png Back Orifice

img1.png Sub7

img1.png Beast (Pretty cool one. I will teach it at the end of the chapter. Prank your friend!)

img1.png ProRat

img1.png Zlob Trojan

img1.png SpySheriff

img1.png Vundo

img1.png Turkojan

img1.png Trojan-Downloader.Win32.Kido.a

Who is hacker?

Notable quote

"Before Google, companies in Silicon Valley already knew it was important to have the best hackers. So they claimed, at least. But Google pushed this idea further than anyone had before. Their hypothesis seems to have been that, in the initial stages at least, all you need is good hackers: if you hire all the smartest people and put them to work on a problem where their success can be measured, you win. All the other stuff-which includes all the stuff that business schools think business consists of-you can figure out along the way. The results won't be perfect, but they'll be optimal. If this was their hypothesis, it's now been verified experimentally."

- Paul Graham

img1.png A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.

img1.png One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.

img1.png A hacker is a person who breaks codes and passwords to gain unauthorised entry to computer systems.

img1.png A person who is good at programming quickly.

img1.png One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.

img1.png A malicious meddler who tries to discover sensitive information by poking around.

img1.png A hacker is anonymous.

For some people, the challenge of breaking the codes is irresistible and so precautions have to be taken.

Stand-alone computers are usually safe as there is no connection for the hackers to break into. Computers which form part of networks or those with external links, such as attached modems, are in danger from hackers.

Many hackers often don't intend to cause damage or steal data, they just enjoy the challenge of breaking into a system. However, in some instances the hacker's purpose could be to commit fraud, to steal valuable data or to damage or delete the data in order to harm the company.

It might be hard to believe, but most hacking is carried out by employees with a grudge or those who want to 'make a quick buck'. They have insider knowledge of passwords and User IDs which makes it easy for them.

Hacking is not a recent invention. In fact, it has been around since the 1930s, although not always associated with computers. Here's a rundown of some of the most noteworthy hackers in history.

1: Kevin Mitnick

Kevin Mitnick, once considered the most-wanted cybercriminal in the United States, is often touted as the poster child of computer hacking. Kevin mastered an early form of social engineering (scamming operators) and computer hacking to gain access to and modify telephony switching systems. After a very public two-year chase, arrest ,and incarceration, the hacker community collectively rose in protest against what they viewed as a witch hunt.

2: Robert Tappan Morris

On November 2, 1988, Robert Morris released a worm that brought down one-tenth of the Internet. With the need for social acceptance that seems to infect many young hackers, Morris made the mistake of chatting about his worm for months before he actually released it on the Internet, so it didn't take long for the police to track him down. Morris said it was just a stunt and added that he truly regretted wreaking $15 million worth of damage, the estimated amount of carnage caused by his worm.

3: Vladimir Levin

Seeming like the opening of a James Bond movie, Vladimir Levin was working on his laptop in 1994 from his St. Petersburg, Russia, apartment. He transferred $10 million from Citibank clients to his own accounts around the world. As with most Bond movies, Levin's career as a hacker was short lived with a capture, imprisonment, and recovery of all but $400,000 of the original $10 million.

4: Yan Romanowski

Yan Romanowski, also known as MafiaBoy, was arrested in February 2000 for launching a denial-of-service attack that brought down many of the Internet's largest sites, including Amazon, eBay, and Yahoo. Yan's lawyer claimed, "If [MafiaBoy] had used all his

You may also like...