Hacking-Definition
[Disclaimer: The content of this article is for educational purposes only and some of the information in this article was the author's opinions and experiences. It was written to express the opinions and experiences of the author and to share some knowledge about Hacking.]
Hacking? malamang narinig o nabasa mo na ang terms na ito sa pamamagitan ng ating makabagong teknolohiya, pero ano nga ba ang hacking?
Ayon sa Techopedia, Hacking is unauthorized intrusion into a computer or a network. The person engaged in hacking activities is generally referred to as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system.
So paano nga ba nanghahack ang mga hackers? ito ay sa pamamagitan ng ilang mga techniques at mga tools, Ito ay iilan lamang sa mga techniques na madalas ay ginagawa ng mga hacker:
Vulnerability scanner - ito ay yung paraan ng pagcheck ng computer sa isang network para malaman kung ano ang kahinaan nito.
Password Cracking - ito ay ang process ng pagrecover ng password mula sa mga data na nakastored on nakatransmit galing sa mga computer systems.
Packet Sniffer - ito ay isang application na nagcacapture ng data packets para makita ang data at password sa mga transit mula sa networks.
Spoofing Attack - it involves websites which falsify data by mimicing legitimate skills, and they are therefore treated as trusted sites by users or other programs.
Root Kit - this one represents a set of programs na kung saan nagwowork to subvert control of an operating system mula sa legitimate operators.
Trojan Horse - ito ay isa sa mga pinakakilala natin na ginagamit ng mga hacker, ito ay parang isang virus na kumakalat sa isang system kapag nailagay mo na ito, it also serves as a backdoor sa computer systems para makapasok ang isang intruder at makuha ang mga data ng isang biktima.
Viruses - ito ay isang self-replicating programs na kumakalat sa pamamagitan ng paglalagay ng kopya nito sa isang system, example of it is the one that creates shortcut files in your system or USB.
Key loggers - it is the last one but the dangerous one though, it is the tools designed to record every keystroke on the affected machine for later retrieval, ito ang madalas na ginagamit ng mga hackers sa mga computer shops kung saan maraming naglalaro.
Pero alam niyo ba na mayroong ibang corporations na nageemploy ng mga hackers bilang kanilang support staff, they can also be the ethical hackers who fights against malicious hackers and they are the one who checks if one website has a hole or weaknesses and they will secure it to prevent it.
Pero bago ka maging ethical hacker you must know how malicious hackers act, so you can fight them. (You need to be bad before you will be the good one)
YOU ARE READING
Hacking Articles
RandomHacking Articles is an article/guides about basic hacking and any topics related to Hacking/Technology. This was written by Rovic Balingbing a.k.a. Baby Esue, it consists of 30 parts, this "Hacking Articles" consists of some articles, guides, tutor...
