Hackers
with skills can see & fix software flaws in the computer, usually
later published openly on the Internet for the system to be better. Unfortunately, few people take malicious use the information to the crime - they are usually called cracker. Basically the hacker & cracker no different from the art world, here we are talking art Internet security network.
I hope the science of network security in this paper are used for things that are good - be a hacker not a cracker. Do not until you hit karma for using science to destroy property of others. Moreover,
at this time akanhacker growing needs in Indonesia with more and more
dotcommers who want IPO on various stock exchanges. A good name & value could fall a dotcom even become worthless if the dotcom collapse. In
this condition, can be expected parahacker security consultant for the
dotcommers is - because the police HR & Indonesian security forces
far too weak & pathetic in the field of Information Technology &
Internet. What can make cybersquad, private cyberpatrol perhaps necessary for survival in Budayakan dotcommers Indonesia on the Internet.
A
variety of Internet network security techniques can be obtained easily
on the Internet, among others, in http://www.sans.org,
http://www.rootshell.com, http://www.linuxfirewall.org/, http:// www.linuxdoc.org, http://www.cerias.purdue.edu/coast/firewalls/, http://www.redhat.com/mirrors/LDP/HOWTO/. Some
of these techniques in the form of books that the number of its several
hundred pages which can be downloaded free of charge (free). Some
Frequently Asked Questions (FAQ) about network security can be obtained
at http://www.iss.net/vd/mail.html,
http://www.v-one.com/documents/fw-faq.htm. And
for the experimenter some scripts / programs that have become
available, among others in http://bastille-linux.sourceforge.net/,
http://www.redhat.com/support/docs/tips/firewall/firewallservice.html .
For
readers who wish to gain knowledge about the network can be downloaded
for free from http://pandu.dhs.org, http://www.bogor.net/idkf/,
http://louis.idaman.com/idkf . Some books that shaped softcopy can be downloaded free of charge can be taken from http://pandu.dhs.org/Buku-Online/. We have to thank especially the Scout team led by I Made Wiryana for this. At
this time, I do not really know of any place of active diskusiIndonesia
discuss these hacking techniques - but may be partially discussed in
the mailing list information such as that in
kursus-linux@yahoogroups.com & linux-admin@linux.or.id operated by the Linux Users Group Indonesia (KPLI) http://www.kpli.or.id.
The
simplest way to see the weakness of the system is to seek information
from various vendors such as in
http://www.sans.org/newlook/publications/roadmap.htm # 3b of the
weaknesses of the system that they created themselves. In
addition, monitoring the various mailing lists on the Internet relating
to network security as in the list
http://www.sans.org/newlook/publications/roadmap.htm # 3e.
Sunday, November 6, 2011
Learning to Become a Hacker
2:24 AM
No comments






0 comments:
Post a Comment