PINOY MANIA FORUM SITE
WELCOME TO PINOY MANIA FORUM!
NEW HERE? PLEASE REGISTER NOW!

ETHICAL HACKERS Coolte16

MEMBERS PLEASE LOGIN
THANK YOU!
PINOY MANIA FORUM SITE
WELCOME TO PINOY MANIA FORUM!
NEW HERE? PLEASE REGISTER NOW!

ETHICAL HACKERS Coolte16

MEMBERS PLEASE LOGIN
THANK YOU!
PINOY MANIA FORUM SITE
Would you like to react to this message? Create an account in a few clicks or log in to continue.

PINOY MANIA FORUM SITE

POWERED BY: www.uzzapmania.evenweb.com
 
HomeLatest imagesGamesRegisterLog in

 

 ETHICAL HACKERS

Go down 
AuthorMessage
hogwarts201
Forum Legend
Forum Legend
hogwarts201


Posts : 859
Join date : 04/12/2010

ETHICAL HACKERS Empty
PostSubject: ETHICAL HACKERS   ETHICAL HACKERS Icon_minitimeTue Dec 14, 2010 10:51 pm

- An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them.

Ethical hacking is also known as penetration testing, intrusion testing and red teaming. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.
One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems. According to Ed Skoudis, Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common outside the government and technology sectors where it began. Many large companies, such as IBM, maintain employee teams of ethical hackers.
In a similar but distinct category, a hacktivist is more of a vigilante: detecting, sometimes reporting (and sometimes exploiting) security vulnerabilities as a form of social activism.
Hacking Antibiotic
Electronic Eavesdropping…
Are You An Unsuspecting Victim?

ID Theft is the number one crimeas of this writing.

As the smoke clears from the sudden onslaught of computers and the
Internet, millions of people are suddenly discovering their private
information isn’t as private as they thought it was.

In fact, many law enforcement agencies are learning that electronic
information theft is quickly becoming the nation’s number one way that
crooks are using to get their hands on goods and services with the least
chance of getting caught!

Many successful cyber thieves are finding it extremely easy to scour
someone else’s computer for passwords and credit card numbers from
the comfort of their own homes.

Most of the tools used to spy on other people’s computers are freely
bought and sold over the Internet under the guise of legally sold
hardware and software.

This report will expose the most common and least known ways a
criminal can steal from you, without you suspecting a thing.

Law enforcement just can’t keep up with the cyber tide so consumers
and business owners are now in the precarious position of protecting
themselves or else suffer the consequences.

All of us use computers for filing our taxes, running our companies, and
for purchasing everything from prescriptions to automobiles over the
Internet.

Most people don’t know how easy it is for anyone with a computer and
Internet access to “electronically” peer over our shoulder, while we
access our bank accounts, trade stocks or chat with our loved ones.

Our goal here is to expose to you the most used tools of the cyber
criminal and show you how to protect yourself.


Good Or Evil?… You Decide

Many companies are marketing the tools below as an easy way to
watch your children’s Internet use or your employees’ use of your
computers, but keep in mind that these products can be used by
criminals just as easily.

If they are designed to be concealed from the computer operator,
they can be used by the bad guys too…
Covert High Tech Tools

• Hardware Keyloggers - what they are and what they look like.

• Computer Recording Software – what it is and how it’s used to
monitor employees, children and maybe even used to spy on you,
along with examples of such products.

• Computer Recording Software Detectors: what you need to be
sure no one is spying on you, including the most popular spy
software detection products.

• Anonymous Browsers: What they are and how they make anyone
who uses them invisible when they surf the Internet, including
some of the top anonymous browser sites on the Internet.
• Electronic File Shredders – What they are and why everyone

should use them, including websites of the top electronic file
shredders.
Back to top Go down
hogwarts201
Forum Legend
Forum Legend
hogwarts201


Posts : 859
Join date : 04/12/2010

ETHICAL HACKERS Empty
PostSubject: Re: ETHICAL HACKERS   ETHICAL HACKERS Icon_minitimeTue Dec 14, 2010 10:52 pm

Hardware Keyloggers

These types of keyloggers require that the perpetrator have physical
access to your computer. They can easily be installed in less than 5
seconds. They come in the form of USB port connectors, keyboard
connectors and even masquerade as keyboards themselves.

Once installed, a hardware keylogger will capture every keystroke
entered into your keyboard and then store it for future retrieval on the
device itself.

Some hardware keylogger companies boast a two million keystroke
capacity! That’s about 5 years worth of typing for the average computer
user. Whether at home or in the office, you can easily fall victim to this
type of spying. A Hardware Keylogger is installed between your
keyboard and computer




Some hardware keyloggers come in the form of a keyboard, but if you
examine the line going to the computer you can see an irregular bulge as
pictured below. That should make you very suspicious…


They can even come in a USB drive
How do they work?

All hardware keyloggers have to have the following:

• A microcontroller - this interprets the datastream between the
keyboard and computer, processes it, and passes it to the non-
volatile memory
• A non-volatile memory - this stores the recorded data, even when
power is lost

On the whole, typing a special password into a computer text editor
retrieves the recorded data. As the hardware keylogger is plugged in-
between the keyboard and computer, it detects the password has been
typed and then starts presenting the computer with "typed" data to
produce a menu. Beyond text menu some keyloggers offer a high-speed
download to speed up retrieval of stored data, this can be via USB mass-
storage enumeration or with a USB or serial download adapter.
Back to top Go down
 
ETHICAL HACKERS
Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
PINOY MANIA FORUM SITE :: Pinoy Mania Technology Section :: Computers and Softwares-
Jump to: