Keyboard Shortcuts
Likes
Search
all my freinds
helo
i m very thankfull to all of u for reply to my message "hacking" but i think that u can't understand me what i want. i just want to know "how it can happen" i don't want to do it my self i know its a very bad work. i just want to increase my knowledge. i appreciate all of my freind's advices which they give me about this and i hope that they will help me in future also. thanks to every body ejaz |
Himanshu Sharma
¿ªÔÆÌåÓýhey ,
?
>i just want to know "how it can happen" i don't want to do >it
my self
>i know its a very bad work. ?
Who said that it is a bad work...and by the way breaking into computers
is not the only hacking... we have phone-phreaking...even overclocking... and
many stuff like?that...so please mind what you say...and most importantly
it requires skill...
?
hope that it will clear as to what do you want..
?
Regards , :-)
?
--himanshu sharma
? |
Jim Thibeault (Tebo)
Go to and do a search about
toggle quoted message
Show quoted text
hacking, this site will tell you how just about anything works. Jim ejazabidi@... wrote:
|
Jim Purcell
ejazabidi,
i m very thankfull to all of u for reply to my message "hacking"I am far from an expert in computer security, however I will offer what I have learned. I used to say, no one will care to hack my computer, there's nothing there even interesting let alone valuable, and that is so. And if a hacker had to do his dirty work personally and individually on each computer I could breath easily, a hacker would derive no great feeling is accomplishment for hacking my computer and even less if he saw what was there. However, many hackers use something not unlike what used to be called a War Games program, from the movie by that name. Of course they probably don't bother dialing phone numbers, they probably generate IP addresses. Those are those funny four numbers separated by periods (dots). These are the actual addresses of computers on the internet. The site names are in a look up table which then converts them to the IP address. Now for most of us it is less important what the hackers do to get into a computer than how we can minimize the chances of their getting in. The first and as far as I know the most effective strategy is a fire wall. The term comes from real 'walls' that protect against real fire. For example, in an auto, the steel between the engine and the passenger compartment is called a fire wall. A computer fire wall can be software and hardware or both. At this point I use a program called 'Zone Alarm', which is free to home users. My copy is set up so that any I can go onto the internet without any problem, but anyone or anything on the net will be stopped by the fire wall. If some program tries to gain access to my computer via the internet I pop up windows asks if I want so and so to have access to my computer. Unfortunately the only information that is given is often just the numerical IP address mentioned above. Except in special situations I usually answer no. If I want the site to always have access to my computer I can check a box that says to remember my 'yes' or 'no' choice of this time. I hardly ever check this, I prefer a little inconvenience and more security. Another aspect of firewall protection is that when you install some software the companies may try to gather information about your computer and send it to the company. The only program(s) that I grant unlimited access to the internet are my browsers. Without it I can't get on the internet. What about hardware firewalls? Some people have more than one computer and don't want to have to switch their DSL or Cable modems between the machines. So they install a piece of hardware between their computers and their modem. (as far as I know these don't work with dial up.) This hardware provides a hardware firewall, and added to the software firewall provides reasonable security. Here are some common sense ideas about computer security. (remember, I am NOT an expert, these are only some things I have learned and are only worth a little more than no knowledge at all.) These rules as far as I know apply both to hacker intrusion and susceptibility to viruses. 1. No security system will make you immune to an expert hacker who really wants to get into your system, but most hackers are not experts, and they will go for the more vulnerable computers rather than waste time on those where the owner has taken steps to keep them out, rather like burglars. 2. Install a firewall, at least the free software type, like zone alarm, but a hardware type is good if you have sensitive information on your computer. If you have more than one computer and want them all on the internet, you need the network hub anyway. 3. Regarding viruses: a. Keep your anti virus software up to date, get all updates and often. b. Never accept attachments to email from people you don't know. Some even say not to accept them from people you do know if the person does not make reference in his message to the attachment. Viruses apparently can be attached to email while it is in transit. c. Be careful about software downloads. Most viruses must be executed or the programs they infect must be run. Email itself cannot cause a virus because it is data, the computer must treat a virus as a program. Attachments can be data but they can also be programs and if you run the attachment it could infect your system. d. Don't be afraid. Remember that only a small percentage of computers are hacked or get viruses. We pay attention to these things not necessarily because they are of epidemic proportions but because the results if you are hacked or get a virus may be harmful. Jim |
Jim Purcell
Himanshu,
Who said that it [hacking] is a bad workJim |
Lise Quinn
¿ªÔÆÌåÓýI
think what he is asking is more along the lines of preventing hacking -
understanding how hacking works so that one can safeguard their systems from
such things.
?
³¢¾±²õ¨¦
" If you want to know where the apathy
is, you're probably sitting on it. "? Florynce R.
Kennedy
|
Himanshu Sharma
¿ªÔÆÌåÓýhey ,
?
No offence.!!
what i say is that hackers are not bad and niether
they are evil...those who use these cheats for abuse are bad....we learn and try
it out but always keep that in my mind that it should not hurt anyone....And for
the hacking...I difine it as a way to do the same thing in?a different
way....Happy learning...
?
Sorry if I said BAD/Objectionable to
anyone...!!:-)
?
Regards :-),
?
--himanshu sharma
|
Jim Purcell
Himanshu,
toggle quoted message
Show quoted text
what i say is that hackers are not bad and niether they are evil.. |
Himanshu Sharma
toggle quoted message
Show quoted text
|
Lise Quinn
¿ªÔÆÌåÓýI think you glorify it too much. A hacker's goal is
most often to get around a security or licensing issue. You can romanticize a
thief all you want but they will still serve real time for their crimes. And
they don't look so cool?behind bars. Our own government is considering
equating web-defacing and Denial of service attacks to acts of terrorism.
?
Just because one did no harm after compromising a
system doesn't mean that it is not wrong or 'bad' to do so, I think the argument
that such people give opportunities to create better security is very weak, and
if it were to float at all then it would be true in all cases. Just because you
don't have a steel door and an enhanced security system for your house doesn't
mean that it's alright for anyone to come into your front door and have a party
in your house. To use the security argument, they were just showing you that you
should have better locks on your doors.
?
Lise
?
?
|
Jim Purcell
Lise,
I think you glorify it too much.
|
Lise Quinn
¿ªÔÆÌåÓýI?have a right to disagree
with you and I do, and I do so without calling you stupid. Boy?that's some
nationalistic?comment, ?"because Americans haven't a clue about the
meanings of words and even less about ideas"?what pig-headedly childish
remarks.
?
I still say you romanticize and
glorify a behavior that is nothing more than criminal.
?
Lise
?
?
? ----- Original Message -----
|
G Ramasubramani
¿ªÔÆÌåÓýLise,
?
?? Just for argument sake, by calling all
hackers evil I feel you are throwing out the baby with the bath water. (or
something like that :-)
?
???? It is people who abuse
hacking who are doing wrong. The actual term for these folks is crackers and not
'hackers' as the media portrays.
?
???? You do lock your house,
don't you? By your argument, you should not lock your house also - forget about
installing complex security equipment.
?
??? And, finally, I don't think this
topic comes under Electronics_101. To each one, his (or her)
opinion.
?
Rama
|
Jim Purcell
Lise,
I have a right to disagree with you and I do, and I do so without calling you stupid. Boy that's some nationalistic comment,? "because Americans haven't a clue about the meanings of words and even less about ideas" what pig-headedly childish remarks.?I still say you romanticize and glorify a behavior that is nothing more than criminal.Jim |
Lise Quinn
Whatever - I am not the one who went into a long diatrabe of OPINON of what
toggle quoted message
Show quoted text
a hacker is. And to then state that I don't comprehend words and ideas properly because I am an American! What childishness. And your right - none of this has anything to do with Electronics - but you didn't bother to say so until someone with an opinion different than your own says something. Maybe this is all too close to home for you guys. ----- Original Message -----
From: G Ramasubramani To: Electronics_101@... Sent: Monday, October 29, 2001 3:19 PM Subject: Re: [Electronics_101] all my freinds Lise, Just for argument sake, by calling all hackers evil I feel you are throwing out the baby with the bath water. (or something like that :-) It is people who abuse hacking who are doing wrong. The actual term for these folks is crackers and not 'hackers' as the media portrays. You do lock your house, don't you? By your argument, you should not lock your house also - forget about installing complex security equipment. And, finally, I don't think this topic comes under Electronics_101. To each one, his (or her) opinion. Rama ----- Original Message ----- From: Lise Quinn To: Electronics_101@... Sent: Monday, October 29, 2001 3:13 PM Subject: Re: [Electronics_101] all my freinds I have a right to disagree with you and I do, and I do so without calling you stupid. Boy that's some nationalistic comment, "because Americans haven't a clue about the meanings of words and even less about ideas" what pig-headedly childish remarks. I still say you romanticize and glorify a behavior that is nothing more than criminal. Lise ----- Original Message ----- From: Jim Purcell To: Electronics_101@... Sent: Monday, October 29, 2001 2:51 PM Subject: Re: [Electronics_101] all my freinds Lise, I think you glorify it too much. I'm neither glorifying hackers nor demonizing them. I'm pointing out that being a hacker doesn't automatically mean that you break into computers. There are hardware hackers, software hackers, network hackers, internet hackers. ALL are hackers, non is by the definition 'hacker' someone who does bad things with computers. If they do bad things that ought to be condemned, not because they are hackers, or because there are hacking but because they are 'doing bad' things. If some carpenters stared going around breaking up furniture, we wouldn't imply that all carpenters did that sort of thing, even if quite a few were doing it. A hacker's goal is most often to get around a security or licensing issue. You still don't get the point, HACKERS sometimes do that, not all of them. I'm beating my head against a stone wall, I know, because Americans haven't a clue about the meanings of words and even less about ideas. You can romanticize a thief all you want but they will still serve real time for their crimes. Not because they are hackers but because particular ones have done bad things. And I never romanticize hackers, not even the 'good ones' they are just people and those who do NOT break into computers are still hackers but should not be tarred with the same brush as those who do those things. And they don't look so cool behind bars. Our own government is considering equating web-defacing and Denial of service attacks to acts of terrorism. I agree that those who do damage or snoop with their computers should be punished. But the law being considered apparantly carries the death penalty. This is not a death penalty offense. It should get a serious sentence, but not death. Just because one did no harm after compromising a system doesn't mean that it is not wrong or 'bad' I agree, I have no sympathy for anyone who does intentional harm in any way includeing graphiti. I think the argument that such people give opportunities to create better security is very weak, Well, you know the old saying, It takes a thief.... Safe crackers have been hired to test new safe designed. And they have also gone into the security business. Who knows more about preventing crime but a successful criminal. AFTER they serve their sentences I think they are a good resource to help prevent future crime. Jim To unsubscribe from this group, send an email to: Electronics_101-unsubscribe@... Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. To unsubscribe from this group, send an email to: Electronics_101-unsubscribe@... Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. Yahoo! Groups Sponsor ADVERTISEMENT To unsubscribe from this group, send an email to: Electronics_101-unsubscribe@... Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. |
Jonathan Luthje
Talk about argumentative - it's not about an opinion - it's about facts:
toggle quoted message
Show quoted text
The facts are that: - Some hackers deliberately break the law - although a small minority of them - The term "hacker" means the ability to reverse engineer and modify - a "service person" of software, if you like - this includes such things as MCU's, HTML, PC / Server executables or whatever - so it DOES have a relevance to electronics. In fact if anyone wants to learn to "hack" I would suggest learning to program an 8051 MPU/CPU first off to learn how assembly works and to learn where the registers and memory addresses are. - I quite often find the need to "hack" my own software - PIC / HC811 / Atmel / as well as PC based - if you can program and debug an MCU you are a hacker - *I* am a hacker - although I have never in my life illegally hacked into any software, web page or other system of which I did not have the right to - do you call me evil because of my capability to program and debug an MCU? Oooh ... perhaps I should go to jail - what's the charge? MCU programming ... should get life imprisionment for that one. - Damn right it's "close to home" - I'm guessing for more than just me on this list - it's not an ideallism, it's a developed skill that is coveted - it shows that you can use your brain. Have a nice day .... Jon ----- Original Message -----
From: "Lise Quinn" <lise@...> To: <Electronics_101@...> Sent: Tuesday, October 30, 2001 9:33 AM Subject: Re: [Electronics_101] all my freinds Whatever - I am not the one who went into a long diatrabe of OPINON ofwhat a hacker is. And to then state that I don't comprehend words and ideasyou didn't bother to say so until someone with an opinion different than yourfor these folks is crackers and not 'hackers' as the media portrays.than criminal.does bad things with computers. If they do bad things that ought to becondemned, not because they are hackers, or because there are hacking but becausethey are 'doing bad' things. If some carpenters stared going around breaking uphaven't a clue about the meanings of words and even less about ideas.time for their crimes.but should not be tarred with the same brush as those who do those things.penalty. This is not a death penalty offense. It should get a serious sentence, butthat it is not wrong or 'bad'way includeing graphiti.resource to help prevent future crime. |