Monday 11 June 2012

BEST HACKERS OF ALL TIME 


IN THIS POST I AM GOING TO TELL YOU ABOUT SOME GREAT HACKERS
Black Hat

The Internet abounds with hackers, known as "black hats," who work to exploit computer systems. They are the ones you've seen on the news being hauled away for cybercrimes. Some of them do it for fun and curiosity, while others are looking for personal gain. In this section we profile five of the most famous and interesting "black hat" hackers.

NAMES OF FREE ONLINE STORAGE WEBSITES

IS YOUR HARD DISK FULL DON'T WORRY STORE DATA ONLINE FOR FREE

1) Windows Live SkyDrive : Windows Live SkyDrive which debuted as Windows Live Folders also offers a pretty good amount of 25GB storage space. It’s more reliable and secured. You have to sign up using your Windows Live Id or Hotmail Id. the best part of it is you can access files from your mobile device as well as you can compress and download all your files as a compressed archive. The files can also be specified as public or private with links for sharing as well.

2) Google : Google’s various services like mail docs and Picasa together contribute to have a storage space of about 10 GB which is constantly increasing. By installing a simpleextension we can use 7.5 GB Google’s email space as Hard Disk in our PC. Just install it and follow the instructions given and will show up as a separate hard disk in My Computer. very easy to use
 
3) Adrive : Adrive is another online file storage service with a whopping 50 GB of free storage and can extended to 10 TB with payment.
 
4) Dropbox : Dropbox can be used as client side software on our PC which offers 2 GB of online storage. Just install the software and drag and drop files to upload. The software will automatically upload all of your files when the computer is idle. The transmission of file data occurs over an encrypted channel (SSL) and all files are encrypted which is an added bonus. It even works with all major mobile platforms. good one
 
5) Amazon cloud Drive : If you just want a virtual drive for uploading videos, music docs or photos, you can use the Amazon Cloud drive. Your files can be neatly classified into categories in pre-existing folder structures and the service offers 5 GB of free space. However, files above 2 GB in size cannot be uploaded.
6) Others : Although I have listed only the major services here there are plenty of others too like Mozy, 4shared, Esnips, SafeSync, etc.

REMOVE PDF FILES PASSWORD

There’s a free Windows utility called BeCyPDFMetaEdit

that can help you remove passwords from PDF files but

without make any other change to the document. DOWNLOAD THE UTILITY.

Here’s what you need to do:

1. Launch the program and it will ask your for the location

of the PDF file.

2. Before you select and open the PDF, change the mode

to “Complete Rewrite.”

3. Switch to the Security tab and set the “Security System”

to “No encryption.” Click the Save button and your PDF

will no longer require a password to open.

WEBCAM TRICK

 Here’s a trick that will blow your mind. You can get access to all open public webcams through Google. There are many tricks by which one may get accessed to all the webcams running currently at a particular position and at particular time. However the Google Webcam trick seems to be one the easiest. Here are a simple few steps by which one may do the same.

Step 1: Log on google.com

Step 2: Type ‘inurl:/view.shtml’ as a query

Step 3: You may also try using intitle:”Live View / – AXIS” | inurl:view/view.shtml^ as a query.

Step 4: This would redirect you to a page with the home pages of these urls.

Step 5: The above query reveals the IP network webcams that have been indexed by Google. You can easily get access and locate those unprotected IP network cameras used that are released or leaked to the public internet insecure cameras by using Google.

WHAT DOES A CRACKER DO

A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site's security system.
The term "cracker" is not to be confused with "hacker". Hackers generally deplore cracking. 

DIFFERENCE BETWEEN A HACKER AND A CRACKER

A hacker can be referred to as a ‘white hat’. Some don’t use a system illegally, but expose holes within systems. Their aim is to fix flaws within systems and to improve its security. ‘White hats’ may be security professionals, who are hired by companies to audit network security or test software. They use the "same software tools that crackers use" and "seeks to improve the security of his own network by proactively attacking it as a cracker would. White hats may even create software aimed at thwarting tools available to crackers.
Therefore, they help businesses by understanding how a cracker operates and then takes steps to secure a network against likely avenues of attack.
A hacker can write code in one or more languages, such as C, C++, assembly, Java. They understand what certain codes do and how it works.
Whereas a cracker can be referred to as a ‘black hat’. They break into systems illegally for personal gain, vandalism, or bragging rights. Most crackers are not very knowledgeable or skilful with little programming ability. They therefore rely on automated programs that are downloaded from disreputable websites.
A cracker understands that he/she is breaking the law, and therefore cover their tracks in order to prevent being caught. Fortunately, many crackers are caught due to their lack of skills.
In summary, hacking and cracking can be used both illegally and legally to gain access to a computer network. Other than the ethical difference between the two, the major factor that separates hackers and crackers is an understanding of computer systems and the ability to create software. "A hacker, in the classic sense of the term, is someone with a strong interest in how things work, who likes to tinker and create and modify things for the enjoyment of doing so.

What is a Hacker


Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems."
1) Eric Raymond, compiler of The New Hacker's Dictionary, defines a hacker as a clever programmer. A "good hack" is a clever solution to a programming problem and "hacking" is the act of doing it. Raymond lists five possible characteristics that qualify one as a hacker, which we paraphrase here: