Gourav used his e-pen to express the sparklin's inside his brain: > "how do hackers hack the system ?" sibayan>>The Jargoon File http://www.tuxedo.org/~esr/jargon/ defines a hacker as the followin' : sibayan>>[ Originally, someone who makes furniture with an axe] sibayan>> sibayan>>1. A person who enjoys explorin' the details of programmable systems and howto stretch their capabilities, as sibayan>>opposed to most users, who prefer to learn only the minimum necessary. sibayan>>2. One who programs enthusiastically (even obsessively) or who enjoys programmin' rather than just theorizin' sibayan>>about programmin'. sibayan>>3. A person capable of appreciatin' hack value. sibayan>>4. A person who is good at programmin' quickly. sibayan>>5. An expert at a perticular program, or one who frequently does work usin' it or on it; as in a Unix Hacker. sibayan>>(Definit'n 1 through 5 are correlated, and people who fit themcongrate.) sibayan>>6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. sibayan>>7. One who enjoys the intellectual challeng of creatively overcomin' or circumventin' limitat'ns. sibayan>>8. [depercated] A malicious meddler who tries to discover sensitive information by pokin' around. Hence sibayan>>password hacker, network hacker. The correct term for this sense is cracker. > "what all ways they use ?" sibayan>>In Open Source World (Linux) only password & network hackers exist, but in the Window$ world another sibayan>>specimen do exists. That is Registrat'n No. hackers. To reveal hiden Reg. No. they usually use DOS Debugger sibayan>>(essential) and a Dissambler. To break into a password protected system they use a good Brute Frozin' Soft. To sibayan>>break into a network they use Trojan Horses (Basically), social engg. & reverse engg. And last of all they use sibayan>>Sysop's lack of knowledge ;-) hell lot a food-n-drinks-n-patience ;-D. In the LINUX world there is no question of sibayan>>Reg. No., so nothin' to break. But network and password are there.A good hacker may use his programmin' skill sibayan>>and Dumbo Sysop's knowledge. Thats all. > "what all we do to stop them ?" sibayan>>In Digital World everytin' is _Virtual_. Likewise security is also virtual. To implement ultimate security you've sibayan>>to upgrade yourself all the time. You've to know/imagine the _Holes_ in a system. > "what all they do in reality and practicality for doing this ?" sibayan>>In reality some of them're pro, employed by security agencies. Some of them do this just for fun. Hope you've got a little light. I think other network and Linux Gurus'll provide you more. So.... Happy Hackin' ;-D Sibayan ----------------------------------------------------------------------- The LIH mailing list archives are available at: http://lists.linux-india.org/cgi-bin/wilma/linux-india-help
