HOME * ARTICLES * PROJECTS/SOFTWARES * FUTUREIDEAZ GAMING * FREE E-BOOKS * WEBSITE TOTAL SOLUTION * TUTORIALS * MY PROFILE

 

 

 

 

 

 


Hackers' Euphemism

Back Orifice: A tool written by the well-known hacking group Cult of the Dead Cow to provide a simple yet powerful way for hackers to control a computer from afar. The latest version, Back Orifice 2000, can be used to take over virtually any Windows PC. But first the hacker must trick the PC's user into accepting a Trojan horse, a program that appears benign but actually contains a hidden Back Orifice server. Once Back Orifice is installed, a hacker can do a range of things, from pranks such as changing the look of your screen to more serious breaches such as stealing your passwords.

Black Hat: If you think of www as the wild, wild west, then you can guess on which side of the law the black hat hacker operates. Black hat hackers (aka "crackers") steal data or damage systems. The most dangerous black hats are able to remain undetected for years, secretly monitoring a victim's PC for whatever nefarious purpose they have in mind.

Buffer Overflow: A common and easy-to-exploit vulnerability on many operating systems. Applications and operating systems store commands in short-term memory, called buffer memory. If the OS or program isn't properly coded, hackers can freeze or crash a computer by sending a specially created command that is much longer than the OS or program can handle. Windows 95 was vulnerable to many kinds of buffer overflow attacks launched over the Internet. Today, such attacks against a single computer are rare, though sometimes a hacker can slow down a large Web site with a buffer overflow.

Cracker: Another term for black hat hackers, who operate with criminal or malicious intent.

Denial-of-service Attack: A way to slow down the performance of a Web site by repeatedly and rapidly requesting information from the site's server, preventing the server from focusing on its normal operations and blocking other users from accessing the site. In the past, a hacker would launch this attack over the Internet from a single computer.

Distributed denial-of-service Attack: In 1998, a group of hackers created a program that allows one hacker to launch a massive, coordinated attack from thousands of "zombie computers" that the hacker has taken control of remotely. These DDoS attacks have brought down giant Web sites such as Yahoo and eTrade. But with new detection software and special training, network administrators of large companies usually can stop even a large DDoS attack in its tracks.

Exploit: Shorthand for any vulnerability in an operating system or application that opens a system to a hacker's attack. New exploits are constantly being uncovered. Each time a new OS or large application is released, hackers and security professionals start working to expose its security flaws. News of new exploits spreads on mailing lists from organizations such as CERT, BugTraq, and in Microsoft's security bulletins. In nearly all instances, software makers provide patches to protect against exploits. Many hack attacks occur using well-known exploits for which patches are already widely available, and often succeed because system administrators and computer users fail to install the patches.

Firewall: A software program that prevents intruders from entering a computer or network from the Internet. Anything entering or leaving a system protected by a firewall is examined to see if it violates the system's security standards. A firewall can also be set to prevent unauthorized data, such as a company's proprietary information, from being sent out over the Internet from a user's computer.

Hacktivism: Hacktivism is hacking for a cause. Social or political activism combines with hacking techniques--hackers who use their skills to make a statement, or activists who learn hacking skills specifically to take their message to the Web and reach a larger audience. Hacktivists might deface child pornography Web sites, or post messages about policies or governments they oppose. Political hacks have been targeted against the governments of India, Israel, China, and the United States, among other countries.

Intrusion Detection System: A burglar alarm for a computer or network that tells an administrator when an intruder might be trying to gain access to the system. Intrusion detection systems go one step further than firewalls: They can determine exactly what kind of attack is being launched, and can alert administrators to enact appropriate countermeasures. They also give administrators data to help them track any intruders who successfully enter a system.

Root: This term is adopted from the world of UNIX systems, where the user who has the highest privileges on a UNIX machine is given the log-in name "ROOT." Hackers use the term to describe obtaining total control over a system. The term is used both as a verb ("I rooted that FBI box") and as a noun ("I got root on that NSA machine").

Script Kiddie: An inexperienced hacker who uses prewritten applications (available as downloads from the Internet) to launch certain types of attacks, such as Web-page defacements or denial-of-service attacks. More experienced hackers tend to disdain script kiddies, because the script kiddies often don't understand the technology behind the attacks they launch.

Trojan Horse: A Trojan horse is an application designed to perform an illicit or malicious action, but is disguised as a more benign program. Often arriving via e-mail as an attachment, Trojans are far more sophisticated than viruses or worms, and often allow a hacker unlimited access to a compromised machine. Three of the most common Trojan horses are Back Orifice, NetBus, and SubSeven.

White Hat: A hacker who is motivated to explore systems for intellectual curiosity, rather than for malicious or criminal intent. White hat hackers oppose doing damage to systems, stealing data, or interrupting service to a Web site. But their activities may be illegal if they explore systems they aren't authorized to enter. White hats can also unintentionally damage or delete data. Many white hat hackers work as well-paid security consultants, programmers, and network administrators.

More on hacking

 

Make Us Your Homepage
© Futureideaz Total Solutions ™ 2003
® vishalakhouri 1999 - 2003 ~ All Rights Reserved
Akhouri Vishal Sinha holds the exclusive rights over all the materials/ softwares/ program codes exhibited at this website.