Skip to main content

Ethical Hackers vs. Malicious hackers

It is important to know the difference between an ethical hacker & a malicious hacker ( also know as crackers)

Ethical hacker as we already know is a person who hacks system to find vulnerabilities and secure them.On the other hand, a  malicious hacker or a cracker hacks  system to take control over it.There are mainly two reasons because of which a person could hack a system -

For fun - Yes , a malicious hackers will hack a  system and then boast about it in front of friends.
For Some benefit- Benefits ranging from financial to personal. A malicious hacker could hack into a credit card transcation processing server to get a list of credit card numbers & use them in a financial fraud.

Please keep in mind, malicious hackers are criminals & hacking someone’s system without his/her consent is a legal offense punishable under law.

In modern parlance , the hacker ethic is either:
The belief that information-sharing is a powerful positive good, and that it is an ethical  duty of hackers to share their expertise by writing free software and facilitating access to information and computing resources wherever possible; and/or
The belief that system cracking for fun and exploration is ethically acceptable as long as the hacker commits no theft, vandalism, or breach of confidentiality.
 
Both of these normative ethical principles are widely,but by no means universally,accepted among hackers.The first and arguably the second,emerged from the MIT Artificial intelligence Laboratory during the ’60s and ’70s.

Comments

Popular posts from this blog

Valentine's week

Celebrate your Valentine's week with  Your Valentine 7 Feb Rose Day 8 Feb Propose Day 9 Feb Chocolate Day 10 Feb Teddy Day 11 Feb Promise Day 12 Feb Kiss Day 13 Feb Hug Day 14 Feb VALENTINE'S DAY 15 Feb Slap Day 16 Feb Kick Day 17 Feb Perfume Day 18 Feb Flirting Day 19 Feb Confession Day I want to confess dear sweetheart!! (*-*) 21 Feb Break Up

Free download XSS SHELL v0.3.8

XSS SHELL v0.3.8 WHAT IS XSS SHELL ? XSS Shell is powerful a XSS backdoor and zombie manager. This concept first presented by "XSS-Proxy - http://xss-proxy.sourceforge.net/  ". Normally in XSS attacks attacker has one shot, in XSS Shell you can interactively send requests and get responses from victim. you can backdoor the page.  You can steal basic auth, you can bypass IP restrictions in administration panels, you can DDoS some systems with a permanent XSS vulnerability etc. Attack possibilities are limited with ideas. Basically this tool demonstrates that you can do more with XSS. FEATURES XSS Shell has several features to gain whole access over victim. Also you can simply add your own commands.  Most of the features can enable or disabled from configuration or can be tweaked from source code. Features; - Regenerating Pages - This is one of the key and advanced features of XSS Shell. XSS Shell re-renders the infected page and keep user in virtual environment...

AutoCAD 2011 KeyGen : AutoCAD 2011′s Serial, Activation, License Key, Product Key, Patch

[ How To Use ] Install Autodesk Autocad 2011 Use as Serial 356-72378422 .. or anything matching this template Use as Product Key 001C1 Finish the installation & restart Autodesk Product Before clicking on Activate You have 2 options (Choose option a or b) : - a) Disable Your network Card, pull the network cable out or block with firewall      (this is just to disable online serial check) OR - b) Click on Activate and it will tell you that your serial is wrong, simply click on close et click on activate again. Select “I have an activation code from Autodesk” Once at the activation screen : start XFORCE Keygen 32bits version if you are installing a 32bits application and 64bits if you are installing a 64bits application. Click on Mem Patch (you should see successfully patched) Copy the request code into the keygen and press generate Now copy the activation code back to the activation screen and click Next You have a fully registered autodesk product NO LAME...