Saturday, 18 January 2014

How to Use Android Mobile Camera As Pc WebCam – Use Any Android Device as PC WebCam

How to use Android Mobile as PC Webcam
I think many of peoples have not Web cam and many are using web cam for video chat but here I will show you how you can use android mobile camera as PC Web cam for make online video chats and calls.
 
Why you should use Android Mobile Camera? Why not separate Web cam.
Android mobiles have at least 5 to 12 Mega pixel cameras and if use other cams that only 2 MP cameras there is written many fake specs on camera but all are fake. A Good camera is for at least 50$ so why you don’t use android mobile phone if you have. Show better result with android mobile cameras.
Key Feature:
  • Free of Cost
  • Save money for Separate camera
  • Good Camera Result
  • No need for Light if need then On Night Mods
  • No Need Wire it will work on wireless base.
Requirements
The Tool installed on Android Device & Computer Both, Android Device must be have at least one camera. Once you installed Android Client and windows Client you will be able to use Android cam as PC web cam.
Configuration:
There are two ways to connect Android Client with PC 1st is Wifi and 2nd Is Bluetooth you can connect with both ofwireless connectivity options. Well here I will show you a guidance how to connect with both of this.
Why Smart Cam Application?
There are a lot of applications like IPCam or other Webcam apps but that tools have not good features Smart cam,smart Cam is free of cost and provide all options like brightness etc.
How its Works :
You can connect with wifi and bluetooth from wifi option you have to configue Ip and port option in Android Phone then connect it it will automatically connect to PC. and from Bluetooth it work very easy you can commonly set up the options i will show you connectivity with wifi.
How to do : here is the Example of Wifi
Step1>> Install Android Client and Windows Client which i given download Links under requirements box. Make sure application has been installed on both OS, first open Cmd Commond Prompt by startmenu “ipconfig /all” or “ipconfig” without quotes it will show you your Ip address. keep Open Command Prompt and follow step 2.
 
 Step 2 >> Open Smartcam Client go to menu option >> Settings choose Connection Type is TCP/Ip/(Wifi) then again go to settings Remote server and enter that IP or HostName which you found in CMD and press OK.
 
Step 3 >> Go to SmartCam Android App Main and menu then press connect option you will star began see into PC.
 
 I Hope you like this article feel free to comment on the post and keep visiting blog.

Monday, 1 April 2013

How Anonymous Works


Introduction to How Anonymous Works  

Some organizations use the power of the Internet for good; others, for evil. Some leverage their digital power in full view of the world, legally (or just shamelessly) staking claims to online territories. Others are Anonymous.
Anonymous is an amorphous group of computer-savvy people who sometimes work toward a common cause as so-called hacktivists. A hacktivist (a combination of the word hacker and activist) is someone who uses tech know-how to protest against censorship or perceived political, legal or societal injustices (among other things). In doing so, a hacktivist hopes to bring attention to a cause and to trigger action that addresses those injustices.
Hacktivists often band together to exact revenge of their own design, and Anonymous is a famous (or infamous) example. The group may choose to deface a popular Web site by replacing graphics and text with their own messages. Or they may initiate DDoS (distributed denial of service) attacks, in which hackers overload computer systems, making sites and networks completely unavailable to anyone.
These tactics often work. For years, Anonymous has succeeded in garnering worldwide attention for specific causes, or other times, just for fun.
Here's just one example: In 2011, Sony sued one of its customers -- George Hotz -- for creating a workaround that allowed PlayStation 3 users to run the Linux operating system. The thing is, Sony had initially advertised Linux capability as a PS3 feature, but backtracked and created a patch to disable Linux operability.
Sony's actions were so outrageous to Anonymous that it sabotaged Sony's PlayStation Network, the company's online multiplayer system. For nearly a month, no one could access the network, and the company's stock price took a major hit.
Was Anonymous in the wrong for punishing Sony? Or were these hackers merely exacting justifiable revenge on a gigantic, litigious company that lashed out at its own customers?
Whichever side you support, Anonymous got exactly what it wanted: headlines. The breathless news stories that follow Anonymous attacks often condemn Anons (shorthand for group members) as cyber-terrorists, evil vigilantes or anarchists. Other publications brand them as saints who fight back against corruption and injustice in the only way they can.
When enough members of Anonymous latch onto a particular crusade, awful and wonderful things happen. Keep reading and you'll see much more about this famed hacktivist group, which trumpets its presence with the apocalyptic slogan: "We are Anonymous. We are legion. We do not forgive. We do not forget. Expect us!"
Advent of Anonymous
But what is Anonymous, exactly? To be clear, Anonymous is not a well-defined group of computer hackers. It's not a club of anti-social geeks hiding in their parents' basements or well-trained, militaristic outlaws hiding in shadowy bunkers equipped with high-speed Internet access.
Depending on who you ask, Anonymous is a digital consciousness, a worldwide hive mind, a culture, a political and social movement or an online collective. It's really all of the above. Anonymous is a massive group of users of varying computing abilities who have a lot in common. As with any subculture, Anonymous didn't spring forth from a single moment. It developed slowly over time.
It began in 2003 on 4chan, a so-called image board, which is an Internet discussion forum where users post images on just about any topic you can imagine (including some you don't want to imagine). Here, people share anything that's on their minds with zero self-censorship, in part because they can and do post anonymously.
Because you're reading this information on a family-friendly Web site, it's worth noting that 4chan is anything but family-friendly. And in fact, that's exactly how the denizens of 4chan like it. The often over-the-top and obscene language, personal attacks and roughhouse atmosphere act as filter to repel entire swaths of the Internet population.
4chan is infamous in part for its love of lulz (a derivative of LOL, or laugh out loud), the biting, sometimes vengeful laughter earned at the expense of someone else. To get lulz, 4chan lovers will do just about anything, from stooping to the lowest and crudest form of personal insults to reaching for more sophisticated and coordinated trickery that may or may not involve computer hacking.
Most of the time, these pranks are short-lived, pointless and quickly forgotten. The whole point, in fact, is to not take anything too seriously.
But as 4chan evolved, some users saw possibilities for achieving bigger and more elaborates schemes beyond sophomoric practical jokes. These people gravitated from the image board towards IRC (Internet relay chat) systems, where they could communicate more quickly and exchange more detailed information.
It's in this environment that Anonymous began its slow and often fractious rise. There are many splinter groups within Anonymous, all with various causes that may or may not gain traction. But they all have many things in common. There are no leaders. Although some people take on organizational roles, there is no established hierarchy. Everyone is considered equal. Anyone on the planet can be Anonymous. And to be truly considered a part of Anonymous, you must take real and definitive action to help a cause.
On the next page you'll see one of Anonymous's first accomplishments that really gathered widespread acknowledgement, to both cheers and jeers from people around the globe.

Project Chanology

Organized actions from Anonymous became known as ops (short for operations). Some ops fizzle out before a single Web site is vandalized. Others result in online cataclysms that cause real-world financial and political upheaval to the dismay and delight of millions of people.
Anonymous achieved undeniable celebrity status in 2008. That year, a rather unflattering (and creepy) video of Tom Cruise rambling on about his Scientology beliefs was leaked to the Internet, to the anger of church leaders.
So the church attempted to do the impossible -- it tried to remove the video from the Internet. In doing so, they raised the ire of Anonymous, which saw these attempts as a form of censorship. Anons also took issue with the church itself, which it views as a money-grubbing cult.
Thus, Project Chanology was born. Anonymous gathered its collective abilities with the intention of removing the church from the Internet. In a move that would become a hallmark of Anonymous missions, the group broadcast its intentions in a YouTube video.
Then the project began, first as DDoS attack that interfered with the church Web site. Next, there were prank phone calls and orders for unpaid pizza sent to church offices all over the world -- anything to disrupt day-to-day functioning. Of course, these tactics weren't exactly legal, and as a result, risked sealing Anonymous' reputation as law breakers and vigilantes.
Then Anonymous had its moment of clarity, sparked by non-Anonymous Scientologist critic Mark Bunker, who pleaded with the group to use non-destructive and legal means to accomplish its ends.
Thanks to his suggestions, Anonymous shifted from illegal tactics to more legitimate actions, sending thousands of protesters out in front of the churches, all wearing Guy Fawkes masks, the likes of which have become a visual hallmark of Anonymous. These are the same masks worn by the lead character in the movie "V for Vendetta," in which an anonymous anti-hero takes on the powers that be.
During the Chanology ruckus, it became evermore clear that Anonymous was evolving beyond juvenile tricks. Anonymous was getting more serious, more focused and more powerful.
After nearly two years of intermittent pranks and hacking, Anons tired of Project Chanology and mostly ceased activities against the church. There were plenty of other targets out there, and Anonymous was just getting warmed up.

Anthropology of Anonymous

You may question how supposedly faceless, nameless digital activists with no real affiliation or stated allegiance can really accomplish much of anything. Yet as so many people have learned, Anonymous leverages its virtual, digital power for real world results. No one is immune from an Anonymous attack. Mighty governments, humungous corporations, hate groups ... they have all witnessed the reach of Anons cooperating in teams.
For the voiceless and downtrodden, as well as anyone with a penchant for waving handwritten protest signs, Anonymous is a light in the darkness of what some may see as an oppressive New World Order controlled by the rich, powerful and immoral. For those on the other side, Anonymous is a band of vigilantes, anarchists or simply bored computer geeks with destructive streaks. To them, the group is an ominous threat, a sleeping digital dragon that, when awakened, can wreak immense damage.
Defining Anonymous as a group may be a bit misleading, because there's no membership application, no initiation rituals and no certification or diploma that confirms someone as Anonymous. But there are some very real behaviors and customs within Anonymous.
Anonymous has spawned a whole set of mores and social norms and quirks of language, much of it documented in the Encyclopedia Dramatica. This online archive is a sort of like a 101 course to the ins and outs of the Anonymous culture. Fair warning if you choose to venture to this online destination: It is an unfiltered site with graphic language.
While there is no standard rule set, there are rules of the Internet listed at Encyclopedia Dramatica. Rules such as No. 12, which is, "Anything can and will be used against you." And No. 33, "Lurk more, it's never enough." Other rules are stark reminders that Anonymous is not always on righteous, idealistic crusades. Rule No. 6 is, "Anonymous can be a horrible, senseless, uncaring monster." Keep reading and you'll see more about what this beast looks like when it's on the prowl.

More Anonymous Operations

Bored with Scientology, Anonymous turned its collective attention towards other organizations. They attacked the Westboro Baptist Church (which is often classified as a hate group), defacing its Web site and posting messages of tolerance and peace [Source: Vice].
Many Anons were linked to the Occupy Wall Street protesters and encouraged participants to remain peaceful during their sit-ins and marches [Source:Guardian]. They've hunted child pornographers, helping to cripple associated Web sites and releasing the names of people who distributed these illegal images and videos [Source: Zdnet].
Anonymous often strikes government and commercial institutions, too. In one famous instance, they retaliated for government shutdowns of the Pirate Bay and Megaupload, which are Web sites that can be used to distribute movies, music and software. It wasn't that Anons were angry that they suddenly couldn't download music for free. It was that government authorities used the same kind of illegal DDoS attacks that hackers prefer. Only the people who instigated these attacks would ostensibly never face the kinds of criminal charges that any normal citizen would. The irony of the situation fueled outrage among Anons. In retaliation, they hacked the sites of the International Federation of the Phonographic Industry, the Motion Picture Association of America, the U.S. Department of Justice, the Federal Bureau of Investigation and many others [Source: Forbes].
As the Arab Spring sparked in Tunisia, Anons immediately decided to participate, encouraging protesters, coordinating communications and vandalizing Tunisian government Web sites to stoke the fires of revolution [Source: Al Jazeera]. They did the same in Egypt, Syria and other places where the revolution arose [Source: NBC News].
In 2012, in what they called retribution for mistreatment of Palestinians, Anons attacked a series of Israeli government sites, leaking passwords, private databases and much more [Source: TNW]. In 2013, when Indian authorities violently clamped down on political protesters in Kashmir, Anonymous disabled Indian military and polices sites [Source: Economic Times].
When a 16-year-old girl was allegedly sexually assaulted in Steubenville, Ohio in August of 2012, there was evidence to believe that local authorities attempted to protect the perpetrators. Anons in an offshoot group called Knight Sec launched a crusade to unveil the story and the cover-ups. It leaked photos of the assault, as well as a video of a man bragging about the incident -- and then publicized names of those involved, including two star players on the local high school football team [Source: The Nation].
As you can see, the reach of Anonymous is wide, and its operations, impactful. On the next page, you'll see more about how Anonymous gathers members into a workable collective.

Inside Anonymous

Anonymous is fond of using a logo of a person in suit, with a question mark replacing the face. But how do faceless, nameless people meet and coordinate sophisticated hacking attacks and massive real-world rallies? How do you become Anonymous?
The answer is anything but straightforward. Anonymous is hidden in plain sight. There are no official Web sites or social media feeds, of course, because Anonymous has no designated officials or leaders. But various factions of the group do update Twitter feeds and Web sites, such as AnonNews, which posts press releases and information about ongoing operations.
There are a few publicly accessible discussion forums where you can watch chats unfold, though you won't find any particularly sensitive information. Hang around long enough, prove your worth, display useful skills or knowledge and you may eventually receive an invitation to more private discussion groups. And then, maybe, you'll have the opportunity to participate in an Anonymous campaign.
You'll never really know who you're communicating with, of course. Anons don't reveal any personal information. And smart Anons don't go online with their own computers. Instead, they may use publiccomputers, as well as software or services that hide their location.
Even with those kinds of precautions, Anons say that the organization isn't for everyone, and that participating in DDoS or hacking attacks can result in criminal charges and punishment. But they encourage the risk-averse to contribute using other skills, such as research, video production, press release writing, or just by offering insights and ideas into how best to execute new ops.
Although the people active within Anonymous do their best to hide their identities, the group as a whole is very public about its purposes. Anonymous almost always announces its intentions before launching ops. In doing so, the group demonstrates its willingness to be accountable for its own actions, and furthermore, it makes it more difficult for others to take credit for (or scapegoat) Anonymous for acts that the group doesn't commit.
In spite of all the precautions, once in a while Anonymous members are anything but. Keep reading and you'll see that the group doesn't always like the headlines it makes.

Anonymous Destiny

You already know that Anons attempt to vet potential activists whenever they can. But although invitation-only chat systems may weed out a lot of wannabes and stalkers, it doesn't always work as intended.
Authorities and enemies of Anonymous infiltrate the group from time to time, much to the chagrin (or in Anon-speak, the "anti-lulz") of the group. And once in a while, prosecutors build solid cases that result in convictions.
In England in 2012, Ryan Cleary and Jake Davis were arrested for charges related to computer hacking in the name of an Anonymous splinter group called Lulz Security, or LulzSec. The two admitted to attacking computers belonging to the Pentagon, the U.S. Air Force, Nintendo, Sony and the Arizona State Police, among others [source: The Guardian].
There were dozens of other arrests of Anonymous members in 2012, too, all around the world. Most charges are related to Web site defacement, DDoS attacks or for publishing private information that was stolen and leaked to the wider world.
In short, authorities take groups like Anonymous very, very seriously. In early 2013, U.S. Attorney General Eric Holder called groups related to Anonymous, "a steadily increasing threat to America's economy and national security interests" [source: CNET]. To counter that threat, they say, they'll prioritize hacking-related crimes and more actively pursue prosecution.
Many people within the Anonymous community took issue with those kinds of statements. They say they don't want ill-gotten financial rewards or justifiably classified information. Instead, they merely want to cast a ray of light on the germ-ridden and corrupt corners of our society.
Whether or not you agree with the methods and goals of Anonymous, you can bet that this collective of hacktivists isn't going away anytime soon. With every new exploit, Anonymous gains credibility, either as a threat or as a heroic initiative. That legitimacy means Anons are a cultural force that can and does make things happen.
So when government or authorities fail their citizens and journalists won't listen, there is still hope in Anonymous. And for the unfortunate people who intentionally or accidentally wind up in the crosshairs of an Anonymous op, their digital world will never again be the same.

Lots More Information

Author's Note: How Anonymous Works

Love them or hate them, Anons are a true world force that has serious implications for politics and economies everywhere. It is an equalizing force that has reach anywhere there's a computer network. No one can say whether that force will be for good or evil, but's probably safe to say that Anonymous will always be a bit of both – in other words, a digital manifestation of the human condition itself.

Sources

  • Anderson, Nate. "FBI Names, Arrests Anon Who Infiltrated its Secret Conference Call." Ars Technica. Mar. 6, 2012. (Mar. 6, 2013) http://arstechnica.com/tech-policy/2012/03/fbi-names-arrests-anon-who-infiltrated-its-secret-conference-call/
  • Anon News. "Everything Anonymous." (Mar. 6, 2013) http://anonnews.org/
  • BBC News. "Hacking Group Anonymous Latest Victim of Twitter Hack." Feb. 21, 2013. (Mar. 6, 2013) http://www.bbc.co.uk/news/technology-21532858
  • Biddle, Sam. "Anonymous Goes on Megaupload Revenge Spree: DoJ, RIAA, MIAA and Universal Music All Offline." Gizmodo. Jan. 19, 2012. (Mar. 6, 2013) http://gizmodo.com/5877679/anonymous-kills-department-of-justice-site-in-megaupload-revenge-strike
  • Daily Mail. "Top Members of Hacking Group Anonymous Arrested after Leader 'Betrays them and Works with FBI for Six Months.'" Mar. 6, 2012. (Mar. 6, 2013) http://www.dailymail.co.uk/news/article-2111020/Top-members-hacking-groups-Anonymous-LulzSec-arrested-leader-Sabu-turns-in.html
  • Davis, Jake. "My Life After Anonymous: 'I Feel More Fulfilled without the Internet.'" Guardian. Sep. 8, 2012. (Mar. 6, 2013) http://www.guardian.co.uk/technology/2012/sep/09/jake-davis-anonymous-charged-bail
  • Dotson, Kyt. "The Anonymous Impact: Hacktivism in 2011 Exceeded Criminal Breaches." Siliconangle. Mar. 22, 2012. (Mar. 6, 2013) http://siliconangle.com/blog/2012/03/22/the-anonymous-impact-hacktivism-in-2011-exceeded-criminal-breaches/
  • Dugdale, Addy. "China Dismisses New York Times Allegations of Army-Backed Hacking Attempts as 'Groundless.'" Fast Company. Feb. 19, 2013. (Mar. 6, 2013) http://www.fastcompany.com/3006018/fast-feed/china-dismisses-new-york-times-allegations-army-backed-hacking-attempts-groundless
  • Forsyth, Jim. "A Leader of Hacker Group Anonymous Arrested in Texas." Reuters. Sep. 13, 2013. (Mar. 6, 2013) http://www.reuters.com/article/2012/09/13/us-usa-arrest-anonymous-idUSBRE88C1BT20120913
  • Haddad, Mohammed. "Interactive Timeline: Anonymous." Al Jazeera. May 19, 2011. (Mar. 6, 2013) http://www.aljazeera.com/indepth/interactive/2011/05/2011519182744550587.html
  • McCullagh, Declan. "White House Warns of Dangers Posed by WikiLeaks, LulzSec, other 'Hacktivists.'" CNET. Feb. 20, 2013. (Mar. 6, 2013) http://news.cnet.com/8301-13578_3-57570384-38/white-house-warns-of-dangers-posed-by-wikileaks-lulzsec-other-hacktivists/
  • Mutton, Paul. "An Interview with Anonymous." High Severity. Jan. 8, 2011. (Mar. 6, 2013) http://www.highseverity.com/2011/01/interview-with-anonymous.html
  • Norton, Quinn. "Wired.com Embeds with #Occupy and Anonymous." Wired. Oct. 18, 2011. (Mar. 6, 2013) http://www.wired.com/threatlevel/2011/10/quinn-norton-occupy/
  • Norton, Quinn. "Anonymous 101: Introduction to the Lulz." Wired. Nov. 8, 2011. (Mar. 6, 2013) http://www.wired.com/threatlevel/2011/11/anonymous-101/all/
  • Norton, Quinn. "2011: The Year Anonymous Took on Cops, Dictators and Existential Dread." Wired. Jan. 11, 2012. (Mar. 6, 2013) http://www.wired.com/threatlevel/2012/01/anonymous-dicators-existential-dread/
  • Olson, Parmy. "Despite all the Fuss, Trademarked Anonymous Logo, 'Might Not be Valid.'" Forbes. Aug. 2, 2012. (Mar. 6, 2013) http://www.forbes.com/sites/parmyolson/2012/08/02/despite-all-the-fuss-trademarked-anonymous-logo-might-not-be-valid/
  • Risley, Michealene Cristini. "A Conversation with Anonymous." Huffington Post. Jan. 8, 2013. (Mar. 6, 2013) http://www.huffingtonpost.com/michealene-cristini-risley/a-conversation-with-anony_b_2433813.html
  • RT. "Two UK Hackers Plead Guilty to LulzSec Charges." Jun. 25, 2012. (Mar. 6, 2013) http://rt.com/usa/guilty-charges-cleary-us-702/
  • RT. "Anonymous Thrown into China-U.S. Cyberwar Scandal." Feb. 20, 2013. (Mar. 6, 2013) http://rt.com/usa/anonymous-thrown-into-china-us-cyberwar-scandal-172/
  • RT. "White House Target Wikeleaks and LulzSec in Cyber Espionage Report." Feb. 21, 2013. (Mar. 6, 2013) http://rt.com/usa/white-house-targets-wikileaks-and-lulzsec-in-cyber-espionage-report-233/
  • Solyom, Catherine. "Insider Tells Why Anonymous 'Might Well be the Most Powerful Organization on Earth." National Post. May 13, 2012. (Mar. 6, 2013) http://news.nationalpost.com/2012/05/12/insider-tells-why-anonymous-might-well-be-the-most-powerful-organization-on-earth/
  • The New York Times. "25 Suspected Hackers Arrested in International Raids." Feb. 28, 2012. (Mar. 6, 2013) http://www.nytimes.com/2012/02/29/world/europe/25-suspected-hackers-arrested-in-international-raids.html?_r=0
  • Tolentino, Melisa. "The Rise of the Hacktivist [Infographic]." Siliconangle. Feb. 22, 2012. (Mar. 6, 2013) http://siliconangle.com/blog/2012/02/22/the-rise-of-the-hactivist-infographic/
  • Zetter, Kim. "Anonymous Spokesman Barrett Brown Faces New Charges." Wired. Jan. 25, 2013. (Mar. 6, 2013) http://www.wired.co.uk/news/archive/2013-01/25/barret-brown-charges


[Source : HowStuffWorks]






Monday, 31 December 2012

Who a Hacker really is...?

Most people have false misconception regarding to the definitions of a Hacker or Hacking. Now, first of all, in order to understand the real definition of Hacker or Hacking, it is firstly very important to understand, What a Hacker is NOT.
First of all a hacker is definitely not a criminal.A hacker is not the guy who is breaking the cyber laws,stilling credit card numbers, deface in websites,creating hyper from the internet,releasing viruses and so on...A hacker is also not a teenager, sitting in a dark room in some one corner eating pizzas a whole day and breaking into the FBI website.A hacker is also surprisingly NOT ALWAYS a computer visitor. He is not somebody who can break into or crack passwords to all website, to all application or to all software.  Unfortunately all these false misconceptions or definitions have been created are a basically false metamorphosis created by the mask media, created by the people and created by the masses.

So exactly Who A Hacker Is ?

A real definition of a hacker is actually somebody or a person who have some very impressive qualities or characteristics.
First of all a hacker is somebody who likes to think out of the box.He is somebody who always wants to test his limits and wants to achieve things that are normally not achievable, normally most wouldn't even think of those things.
A hacker is always somebody who wants try the other things which are not written in the manual, which are not written in the rule book.
A hacker always want to discover unknown features, unknown characteristics, unknown tips,unknown tricks and wants to make things work in a manor that most people can't do in imagine.
A hacker is dedicated to knowledge dedicated to research.A hacker also always believes in stretching the limits.And most importantly a hacker is somebody who is highly creative, highly innovative and can actually think honestly and achieve things that are beyond the capacity of the average person.
And based on these definitions  based on these characteristics of what a hacker real is. I would imagine or I would put some of the most famous scientist and inventors and may be creative people into the category of a definition of a hacker.
So Newton,Einstein are example of hackers.Those people who are creative,who are dedicated to knowledge, wanted to always learn, wanted to challenge the limit, wanted to stretch the limits and do things that are beyond the capacity of the average person.For example: If taking about a train A hacker would be a person who would like to make the train go faster than the world wide record,A hacker would be a person who think of common problems and would try to solve those problems. 

A Modern Day Hackers


Classifications

Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hatgrey hatblack hat andscript kiddie. In contrast to Raymond, they usually reserve the term cracker for more malicious activity. According to (Clifford R.D. 2006) a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system". These subgroups may also be defined by the legal status of their activities.

White hat

white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants, is one of those organisations that have developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.

Black hat

A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. They choose their targets using a two-pronged process known as the "pre-hacking stage".
Part 1: Targeting
The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).

Grey hat

A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.

Elite hacker

social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.

Script kiddie

script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature).

Neophyte

A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.

Blue hat

blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.

Hacktivist

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, mosthacktivism involves website defacement or denial-of-service attacks.

Nation state
Intelligence agencies and cyberwarfare operatives of nation states.

Organized criminal gangs
Criminal activity carried on for profit.

Bots
Automated software tools, some freeware, available for the use of any type of hacker.

What's Trending?

Search This Blog

Loading...