Showing posts with label Twitter. Show all posts
Showing posts with label Twitter. Show all posts

Be A Hacker : Basic Tips

Basics of Hacking

Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context.

Basic Classification


Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie.


White Hat 
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council , also known as the International Council of Electronic Commerce Consultants has developed certifications, course ware, classes, and online training covering the diverse arena of Ethical Hacking.

Black Hat
A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.

Grey Hat
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.
to be continued...........

twitter tips

This is the first of many posts. So You signed up for a Twitter account. Now what? Well you Tweet! Find something you want to share with people. Don't be afraid, just be yourself. If you want you can follow me and then send me a note and say you found me on this Blog and I will follow you back. At first Twitter may not seem to make sense, but you just need to dive in head first. Maybe observe a little after you make your first tweet. There are so many different things related to Twitter I am not sure where to begin. It is probably a good idea to fill out you profile and be honest. I am not suggesting that you divulge your home address by any means, but put something interesting about who you are, or what you do. If you have a Blog or a website and you want people to know about it, then put it in your profile. Beside connecting to other people, Twitter is a great source to find out about what is happening around you in this world. In my opinion Twitter was one of the ways that Obama was able to communicate with his followers and had some impact on the election. There are not only individuals on Twitter, but news outlets, see CNN Breaking News.