ShoutMix chat widget

Pages

Sunday, November 6, 2011

Learning to Become a Hacker

Hackers with skills can see & fix software flaws in the computer, usually later published openly on the Internet for the system to be better. Unfortunately, few people take malicious use the information to the crime - they are usually called cracker. Basically the hacker & cracker no different from the art world, here we are talking art Internet security network.
I hope the science of network security in this paper are used for things that are good - be a hacker not a cracker. Do not until you hit karma for using science to destroy property of others. Moreover, at this time akanhacker growing needs in Indonesia with more and more dotcommers who want IPO on various stock exchanges. A good name & value could fall a dotcom even become worthless if the dotcom collapse. In this condition, can be expected parahacker security consultant for the dotcommers is - because the police HR & Indonesian security forces far too weak & pathetic in the field of Information Technology & Internet. What can make cybersquad, private cyberpatrol perhaps necessary for survival in Budayakan dotcommers Indonesia on the Internet.
A variety of Internet network security techniques can be obtained easily on the Internet, among others, in http://www.sans.org, http://www.rootshell.com, http://www.linuxfirewall.org/, http:// www.linuxdoc.org, http://www.cerias.purdue.edu/coast/firewalls/, http://www.redhat.com/mirrors/LDP/HOWTO/. Some of these techniques in the form of books that the number of its several hundred pages which can be downloaded free of charge (free). Some Frequently Asked Questions (FAQ) about network security can be obtained at http://www.iss.net/vd/mail.html, http://www.v-one.com/documents/fw-faq.htm. And for the experimenter some scripts / programs that have become available, among others in http://bastille-linux.sourceforge.net/, http://www.redhat.com/support/docs/tips/firewall/firewallservice.html .
For readers who wish to gain knowledge about the network can be downloaded for free from http://pandu.dhs.org, http://www.bogor.net/idkf/, http://louis.idaman.com/idkf . Some books that shaped softcopy can be downloaded free of charge can be taken from http://pandu.dhs.org/Buku-Online/. We have to thank especially the Scout team led by I Made Wiryana for this. At this time, I do not really know of any place of active diskusiIndonesia discuss these hacking techniques - but may be partially discussed in the mailing list information such as that in kursus-linux@yahoogroups.com & linux-admin@linux.or.id operated by the Linux Users Group Indonesia (KPLI) http://www.kpli.or.id.
The simplest way to see the weakness of the system is to seek information from various vendors such as in http://www.sans.org/newlook/publications/roadmap.htm # 3b of the weaknesses of the system that they created themselves. In addition, monitoring the various mailing lists on the Internet relating to network security as in the list http://www.sans.org/newlook/publications/roadmap.htm # 3e.

0 comments:

Post a Comment