Walk Lightly on this PLANET and yet leave such a FOOTPRINT that cannot be erased for thousands of Years..!!!
Visit Codstech for Cyber Security related Posts !

Visitors

Sunday, September 6, 2015

Introduction to Hacking

Back to Hacking

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.

When you are surfing the internet, a lot of information is being exchanged between the web hostand the device being used to surf the internet. This type of information can always be easily breached by hackers, especially if it involves online transactions and this has always been a major issue when dealing with the internet. Nowadays, cases of online theft are becoming increasingly popular. There is one way of determining whether a site is safe to use through an SSL Certificate which is powered by cryptography.
PadLock Icon Showing SSL Security

Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.

(In SSL cryptography, encryption makes use of separate keys for the decryption and encryption of data. Encryption keys are public and anyone can use them. But thedecryption keys (ones used to turn encrypted data into meaningful information) are private and are kept secret. The SSL certificate, on the other hand, can simply be described as a tiny data file that has the appropriate information about a certain website. The information can be quickly read by the host connection once the request for connection is received. It is through an SSL that a website can prove its authenticity to a web browser.)
The term computer "virus" originated to describe machine code command inserted into a computer's memory that, on execution, copies itself into other programs and files on the computer thus known as "Computer Hacking".
Generally, a virus is a piece of software, a series of data, or a command sequence that exploits a bug, glitch, or vulnerability.

The best way to know how to protect your computer is to understand the hacker's tools and recognize their damage.

Before starting ,

  • Please keep yourself updated with a little bit knowledge about computer fundamentals , that is , its hardware configuration, input / output operations etc.
  • Then you must understand The BIOS or Basic Input/Output System . It is the first program that runs in the computer. 
  • Learn about flashing the BIOS, accessing component information about RAM, CPU, hard and optical drives, how to use built in diagnostic tools etc 

Back to Hacking

Next