Gourav used his e-pen to express the sparklin's inside his brain:

> "how do hackers hack the system ?"

sibayan>>The Jargoon File http://www.tuxedo.org/~esr/jargon/ defines a
hacker as the followin' :
sibayan>>[ Originally, someone who makes furniture with an axe]
sibayan>>
sibayan>>1.    A person who enjoys explorin' the details of programmable
systems and howto stretch their capabilities, as
sibayan>>opposed to most users, who prefer to learn only the minimum
necessary.
sibayan>>2.    One who programs enthusiastically (even obsessively) or who
enjoys programmin' rather than just theorizin' sibayan>>about programmin'.
sibayan>>3.    A person capable of appreciatin' hack value.
sibayan>>4.    A person who is good at programmin' quickly.
sibayan>>5.    An expert at a perticular program, or one who frequently does
work usin' it or on it; as in a Unix Hacker. sibayan>>(Definit'n 1 through 5
are correlated, and people who fit themcongrate.)
sibayan>>6.    An expert or enthusiast of any kind. One might be an
astronomy hacker, for example.
sibayan>>7.    One who enjoys the intellectual challeng of creatively
overcomin' or circumventin' limitat'ns.
sibayan>>8.    [depercated] A malicious meddler who tries to discover
sensitive information by pokin' around. Hence sibayan>>password hacker,
network hacker. The correct term for this sense is cracker.

> "what all ways they use ?"

sibayan>>In Open Source World (Linux) only password & network hackers exist,
but in the Window$ world another sibayan>>specimen do exists. That is
Registrat'n No. hackers. To reveal hiden Reg. No. they usually use DOS
Debugger sibayan>>(essential) and a Dissambler. To break into a password
protected system they use a good Brute Frozin' Soft. To sibayan>>break into
a network they use Trojan Horses (Basically), social engg. & reverse engg.
And last of all they use sibayan>>Sysop's lack of knowledge ;-) hell lot a
food-n-drinks-n-patience ;-D. In the LINUX world there is no question of
sibayan>>Reg. No., so nothin' to break. But network and password are there.A
good hacker may use his programmin' skill  sibayan>>and Dumbo Sysop's
knowledge. Thats all.

> "what all we do to stop them ?"

sibayan>>In Digital World everytin' is _Virtual_. Likewise security is also
virtual. To implement ultimate security you've sibayan>>to upgrade yourself
all the time. You've to know/imagine the _Holes_ in a system.

> "what all they do in reality and practicality for doing this ?"

sibayan>>In reality some of them're pro, employed by security agencies. Some
of them do this just for fun.

Hope you've got a little light. I think other network and Linux Gurus'll
provide you more.

So.... Happy Hackin'  ;-D
Sibayan




-----------------------------------------------------------------------
The LIH mailing list archives are available at:
http://lists.linux-india.org/cgi-bin/wilma/linux-india-help

Reply via email to