Thursday, 8 December 2011

Black Hats & Wallpapers

Black Hats & Hacking Wallpapers
Normally a A black hat is the villain or bad guy,
In western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat, especially in black and white movies.

Especially in computing World,
where it refers to a computer security hacker who breaks into networks or computers, or creates computer viruses.



A black hat hacker can be described as 
Black Hat Hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain"-By Robert Moore( Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. ) in 2005.

Black Hat Hackers are
"the epitome of all that the public fears in a computer criminal".

Black Hat Hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.
The way Black Hat Hackers choose the networks that they are going to break into is by a process that can be broken down into two parts. This is called the prehacking stage.

Part 1
Targeting - Targeting is when the hacker determines what network to break into. The target may be of particular interest to the hacker, or the hacker may "Port Scan" a network to determine if it is vulnerable to attacks. A port is defined as "an opening through which the computer receives data via the network".Open ports will allow a hacker to access the system.

Part 2
Research and Information Gathering - It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from Social Engineering, which will be explained below. Aside from Social Engineering hackers can also use a technique called Dumpster Diving. Dumpster Diving is when a hacker will literally dive into a dumpster in hopes to find documents that users have thrown away, which will help them gain access to a network.

Reasons :
These Hackers do this may be motivated by a multitude of reasons,
including profit,
protest,
or because of the challenge.
It can be any reasons.

Some may even do it because they might don't knw what its consequences will be Now a days cyber crime are keeping a close watch due to the increase in the terrorist attack which terrorist often use to transfer their messages or some secret information.
For this terrorist can also be refers as black hats or cyber terrorism.

So i will recommend all ma user to stay away from this hacking especially illegal or black hat hacking. If u get caught then the punishment are damn bad.
That's it for this post .
Keep joining us on our official page on ur respective social networking site's

Wallpaper's :



Click here to know 
wats are WHITE HATS

2 comments:

  1. urprisingly! It’s like you understand my mind! You seem to know a lot about this, like you wrote the book in it or something. I think that you could do with some images to drive the message home a bit, but other than that, this is wonderful blog. A good read. I’ll certainly be back.
    ld hardas

    ReplyDelete
  2. This is such a great resource that you are providing and you give it away for free. I love seeing blog that understand the value. thank you

    ReplyDelete

NAVI

Trying to make things Simple and Perfect | No animals were harmed in making of this blog !