• Complain

Sagar - Hacking: Prevention from this dark art of exploitation

Here you can read online Sagar - Hacking: Prevention from this dark art of exploitation full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2015, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Sagar Hacking: Prevention from this dark art of exploitation
  • Book:
    Hacking: Prevention from this dark art of exploitation
  • Author:
  • Genre:
  • Year:
    2015
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Hacking: Prevention from this dark art of exploitation: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Hacking: Prevention from this dark art of exploitation" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Overview: Techniques to protect yourself from hackers.... Having a great knowledge is a good thing but we should never use this to harm people.

Sagar: author's other books


Who wrote Hacking: Prevention from this dark art of exploitation? Find out the surname, the name of the author of the book and a list of all author's works by series.

Hacking: Prevention from this dark art of exploitation — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Hacking: Prevention from this dark art of exploitation" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Hacking
Prevention from this dark art of exploitation

I lost all the pictures of my 11 months old daughter with her great-grandparents who are now deceased . A Hacking victim

Before talking about Hacking lets discuss about the peoples who are involved in this type of art.
Hacker is a person who seeks security weaknesses from a Computer system or a network to gain access to it without any legal permissions from its owner or programmer. And he is smart enough to steal passwords , bank account details , your social networking accounts password and much more.
Hackers may be motivated by multitude of reasons such as Profit , Protest , Challenge , or even for enjoyment . They are highly qualified computer experts believes in doing practical with their knowledge and playing with security systems.


Going further lets discuss about the three basic Hacking techniques Hackers commonly use to hack your confidential dat a .

  1. (A) Phishing Hack
    phishing hack also known as spoofing which is a very basic technique to hack someones online account details such as usernames and password . A hacker design a fake login page which looks exactly like an original website , but if username and password in entered in this fake page then it will be sent to the hackers online storage system and then he can easily access your account with the help of these details.
    For Example : The original website is http://www.friendsmake.com
    And Hackers fake website is http://www.friendsmkae.com


Here you can see the difference in the spelling of the websites. Both page will look same and normal user get manipulated easily. And when he will enter his details on fake page , his password will be sent to hackers online storage system and after that the original page will be opened. And user normally enter their details again , thinking that due to some technical fault again same page is reloaded , and he will use his account normally . On the other hand hacker is accessing his account too , using password he got from his online storage syste m .

(B) Social Engineering for phishing hack


Attracting a user to a fake login page for phishing hack is known as Social Engineering.

A Hacker use attractive lines to attract users to his fake page , taking above example
hacker can send you an anonymous E-mail like this
You Have 25 Friend Requests Click Here

And when you click there you will be redirected to that fake page that I mentioned above.
2. Cookie Stealing Hack


Have you ever noticed whenever you enter your username and password on any social networking website , Your web browser will ask you to remember your password for future visits to the same website. So that next time you use that site you will get logged in automatically.
Your web browser will create a small text file which contains your password for future. (when you open that website again) and save it into your internal Drive. This small text file is known as cookies you can say this small cookie file is a key to your account , and yes Hacker can steal this too from your computer system. By creating a small script hidden beside a link.

Again hacker will manipulate you to click a link with some attractive title , and when you click that link your cookie file will be uploaded to hackers online storage system and he can use it to access your account easily.
3. Key logger
(A) Software key logger

Software key logger is small program designed to record your keyboard activity secretly , it works in background and record everything you type. And then send it to the hacker.
It acts like a spy who keep sending your typed words to his owner .


(B) Hardware Key Logger
Hardware key logger is a small device used to record typed word secretly. Usually it may be attached with keyboard socket in your computer system. Nowadays it is used in many cyber cafes to steal users password and bank account details.
Now the question arises


How to prevent from being Hacked ?
Here are some tips you can follow to reduce the chances of being hacked by hackers .
1. Keep your computer system and antivirus program updated. By regularly updating it at least once in a week.

2. Never click any link claiming for big prizes or offers without knowing it well.


3. Keep an eye on your address bar , most of the website including social network , E- commerce , Money related organizations use https:// connection stands for Hyper text transfer protocol secure is a safe connection specially designed for these types of websites , also check the spelling of the website.
4. Change your password Every month and always Try to use a strong password containing alphabets , numbers and symbols too ,
For eg: abhishek##66SSGGRr22

5. Before using internet in cyber cafe check if there is a black key logger attached to the computers keyboard socket . ( it looks like a small black plug attached with socket and keyboard wire) If yes ,then never use that system for accessing your online accounts. It will steal your passwords .
Having a great knowledge is a good thing but we should never use this to harm peoples.

You can help peoples with your abilities , make them smile , they will bless you and your life will be beautiful.

Internet
Source of knowledge or An Addiction

I nternet is a well known word in todays modern world. From a small smartphone to a super computer this Communication Network technology is available almost everywhere . Useful for everyone whether you are a businessman , student , Entrepreneur or even a housewife. This technology is coming out as a boon to our society , this virtual world contain everything It can be a good source of knowledge but also have some disadvantages like

Internet Addiction Disorder

Internet addiction is described as an impulse control disorder , which does not involve use of an intoxicating drug and is very similar to pathological gambling. Some users may develop a habit of going online without any reason , may be just because they got attached with their online friends on social networking websites or they just got mental satisfaction by looking to a webpage , sometimes being connected to the world via Internet gives a huge satisfaction to an addict . This can be cured by a psychiatrist.

Here are few signs of this addiction :-

  1. Thinking about previous online activities or anticipating of next online session.
  2. Unsuccessful efforts to control or stop internet use
  3. Gradually increasing online timing
    Peoples addicted to Internet gives less time to the real world , results in weak social understandings , connections and this leads to a great problem and disappointment in future.

What to do if you are the one ?
Are you an Internet Addict ? Or just feeling little bit of signs in you ?
Dont Panic
We Have some tips for you , You can try them before going for an expert advice
A. Get a hobby or an interest that does not involve Internet , Television , Video games , Portable media players etc.

B. If You are a student then complete your studies , buy some books and start reading them.

C. If You are parents , Ask your child for help in cooking meals so that he/she can get some work to do other than just surfing internet
D. Hang out with your friends , plan a trip to a beautiful place. Get some distance with your computer or whatever gadget you use to surf Internet.

E. If you own a smartphone and a laptop too which is common nowadays then we recommend you to use internet in your laptop only , and place it away from your eyes.
After Following these tips you may get of rid of this addiction. But if not. Then You should consult with your psychiatrist.
Remember there is a beautiful world outside , Enjoy it , Make some real friends and live your life at its best . Using Modern technology is a good thing but it should be used wisely Let me give you an example of Fire , It can relieve you from teeth shattering winter. But it can also turn you into ashes if you dont use it in a controlled way.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Hacking: Prevention from this dark art of exploitation»

Look at similar books to Hacking: Prevention from this dark art of exploitation. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Hacking: Prevention from this dark art of exploitation»

Discussion, reviews of the book Hacking: Prevention from this dark art of exploitation and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.