| | ETHICAL HACKERS | |
| | Author | Message |
---|
hogwarts201 Forum Legend
Posts : 859 Join date : 04/12/2010
| Subject: ETHICAL HACKERS Tue Dec 14, 2010 10:51 pm | |
| - An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them.
Ethical hacking is also known as penetration testing, intrusion testing and red teaming. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat. One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems. According to Ed Skoudis, Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common outside the government and technology sectors where it began. Many large companies, such as IBM, maintain employee teams of ethical hackers. In a similar but distinct category, a hacktivist is more of a vigilante: detecting, sometimes reporting (and sometimes exploiting) security vulnerabilities as a form of social activism. Hacking Antibiotic Electronic Eavesdropping… Are You An Unsuspecting Victim?
ID Theft is the number one crimeas of this writing.
As the smoke clears from the sudden onslaught of computers and the Internet, millions of people are suddenly discovering their private information isn’t as private as they thought it was.
In fact, many law enforcement agencies are learning that electronic information theft is quickly becoming the nation’s number one way that crooks are using to get their hands on goods and services with the least chance of getting caught!
Many successful cyber thieves are finding it extremely easy to scour someone else’s computer for passwords and credit card numbers from the comfort of their own homes.
Most of the tools used to spy on other people’s computers are freely bought and sold over the Internet under the guise of legally sold hardware and software.
This report will expose the most common and least known ways a criminal can steal from you, without you suspecting a thing.
Law enforcement just can’t keep up with the cyber tide so consumers and business owners are now in the precarious position of protecting themselves or else suffer the consequences.
All of us use computers for filing our taxes, running our companies, and for purchasing everything from prescriptions to automobiles over the Internet.
Most people don’t know how easy it is for anyone with a computer and Internet access to “electronically” peer over our shoulder, while we access our bank accounts, trade stocks or chat with our loved ones.
Our goal here is to expose to you the most used tools of the cyber criminal and show you how to protect yourself.
Good Or Evil?… You Decide
Many companies are marketing the tools below as an easy way to watch your children’s Internet use or your employees’ use of your computers, but keep in mind that these products can be used by criminals just as easily.
If they are designed to be concealed from the computer operator, they can be used by the bad guys too… Covert High Tech Tools
• Hardware Keyloggers - what they are and what they look like.
• Computer Recording Software – what it is and how it’s used to monitor employees, children and maybe even used to spy on you, along with examples of such products.
• Computer Recording Software Detectors: what you need to be sure no one is spying on you, including the most popular spy software detection products.
• Anonymous Browsers: What they are and how they make anyone who uses them invisible when they surf the Internet, including some of the top anonymous browser sites on the Internet. • Electronic File Shredders – What they are and why everyone
should use them, including websites of the top electronic file shredders.
| |
| | | hogwarts201 Forum Legend
Posts : 859 Join date : 04/12/2010
| Subject: Re: ETHICAL HACKERS Tue Dec 14, 2010 10:52 pm | |
| Hardware Keyloggers
These types of keyloggers require that the perpetrator have physical access to your computer. They can easily be installed in less than 5 seconds. They come in the form of USB port connectors, keyboard connectors and even masquerade as keyboards themselves.
Once installed, a hardware keylogger will capture every keystroke entered into your keyboard and then store it for future retrieval on the device itself.
Some hardware keylogger companies boast a two million keystroke capacity! That’s about 5 years worth of typing for the average computer user. Whether at home or in the office, you can easily fall victim to this type of spying. A Hardware Keylogger is installed between your keyboard and computer
Some hardware keyloggers come in the form of a keyboard, but if you examine the line going to the computer you can see an irregular bulge as pictured below. That should make you very suspicious…
They can even come in a USB drive How do they work?
All hardware keyloggers have to have the following:
• A microcontroller - this interprets the datastream between the keyboard and computer, processes it, and passes it to the non- volatile memory • A non-volatile memory - this stores the recorded data, even when power is lost
On the whole, typing a special password into a computer text editor retrieves the recorded data. As the hardware keylogger is plugged in- between the keyboard and computer, it detects the password has been typed and then starts presenting the computer with "typed" data to produce a menu. Beyond text menu some keyloggers offer a high-speed download to speed up retrieval of stored data, this can be via USB mass- storage enumeration or with a USB or serial download adapter.
| |
| | | | ETHICAL HACKERS | |
|
| Permissions in this forum: | You cannot reply to topics in this forum
| |
| |
| Latest topics | » How Much Did Your Money Grow In 2012?Sun Jan 13, 2013 1:02 am by luranski» Nation MU Online Season 5 Episode 4Fri Aug 31, 2012 2:24 pm by aldren2012» The Stock Market Is Soaring… But You Can Still Catch Up If You Act Quickly. Wed Feb 22, 2012 11:25 pm by luranski» ZERO GRAVITY OF TACLOBAN CITY WON @ SHOWTIMESat Jan 28, 2012 12:59 am by paulavenel» PINOYMANIA NASA CELLPHONE NA!!!Mon Jan 02, 2012 9:22 pm by filio» JOIN CLIXSENSE TEAM PHILIPPINES AND EARN MONEY ONLINE JUST BY VIEWING ADVERTISEMENTTue Dec 20, 2011 6:36 pm by icecweam» newbie hereTue Dec 20, 2011 1:25 pm by icecweam» About sa forum na toThu Dec 15, 2011 1:35 am by johnzki» DarkBlast Version 1.0Tue Dec 13, 2011 10:31 am by ryu1219» ULTRASURF FREE INTERNET FOR SMARTBROMon Dec 12, 2011 8:11 pm by kenjack» FREE Lesson When Earning OnlineFri Dec 09, 2011 4:31 pm by daniellealmario» Earn from Home as a Virtual AssistantWed Nov 30, 2011 3:09 pm by daniellealmario» Are You Planning or Already Earning Online?Fri Nov 25, 2011 5:35 pm by daniellealmario» NEWBIE.... lang po aqo.. dito..Sat Nov 05, 2011 5:42 pm by kitty.meow» WILLIE REVILLAME MAGNANAKAW!?Sat Nov 05, 2011 2:20 am by belle» okay lang ba magkaroon ng karelasyon sa UZZAP? lalo na kung alam mong magkalayo kayo? :(Mon Oct 31, 2011 10:35 am by sparklemae» counter strike 240x320 mobile gameSun Oct 30, 2011 10:06 pm by kitty.meow» Use Our Retirement CalculatorSat Oct 29, 2011 5:57 pm by luranski» Use Our Retirement CalculatorSat Oct 29, 2011 5:57 pm by luranski» X-WAR CLANFri Oct 28, 2011 10:34 pm by hunz30 |
Who is online? | In total there are 2 users online :: 0 Registered, 0 Hidden and 2 Guests
None
Most users ever online was 22 on Thu Jun 09, 2011 4:22 pm
|
Pinoy Mania Affiliates | CLICK ON LOGOS TO CONNECT
Pinoy Forum Tambayan Molave Tambayan LSE Clan Forums X-Law Forum Site X-Convict Forum Site Hard To Resist Clan Forum JAM Clan - Metro Manila 1 JAM Clan Wapsite Familia Ban6a6 Forum Site Never SAY Never Forum Wreckless Clan Forum Pinoy Addicts Forum Pinoy Concepts Forum |
|