Friday, 18 July 2014

Who is a Hacker ?

Generally many people has a misconception  about the hacker, Hacker is a term used by Many to mean "someone who tries to break into computer systems or hack your facebook and bank account.“
                             This is not true Actually a hacker is A technology geek, who spends too much time with his computer and submerge with with the world of cyber. A hacker wants to invent new things in the world of computer and Technology. he think that not possible in the real manner or according to old theories.
Actually according to Wikipedia Hacker is A term that first started being used in the 1960s and was used to describe Someone who hacked out computer code, later the term evolved to an individual
 who had an advanced understanding of computers, networking, programming, or hardware,
 but did not have any malicious intents.

                         In other words we can say media and most people think of hackers as malicious or evil, the majority of hackers are people who are curious about how computer,
networks, or programs work and are often exploring and learning.

what are the types of hackers ?
              Most commonly people know about 4 types of hackers According to their  work
1.White Hat Hackers
2.Black Hat Hackers
3.Gray Hat Hackers
4.Suicide Hackers

1. White Hat Hackers

  White hat describes a hacker who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system's owners to fix the breach before it can be taken advantage
        by others (such as black hat hackers.) Methods of telling the owners about it range from
        a simple phone call through sending an e-mail note to a Webmaster or administrator all
        the way to leaving an message that security has been breached.

2. Black Hat Hackers
 Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent. Unlike a white hat hacker, the black hat hacker takes advantage of the break-in, perhaps destroying files or stealing data for some future purpose.
                                The black hat hacker may also make the exploit known to other hackers and/or the public without notifying the victim. This gives others the opportunity to exploit the vulnerability before the organization is able to secure it.

3. Gray Hat Hackers

  A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.
                                 For example, they may hack the computer network of a public agency, let us say, DRDO. That is a federal crime.
                        If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let me say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers.

4. Suicide Hackers

Suicide Hackers are individuals is who aim to bring down critical infrastructure
        for a “couse” and are not worried about facing 30 years in jail for their actions.
        Suicide hackers  are closely related to suicide bombers, who sacrifice their life for the
       Attack and are not concerned with the consequences of their action. There has been
       A rise in cyber terrorism in recent years.

According to their behavior there are lots of categories in that we can divide hackerssome types are here : 

Script kiddies
                               These are the wannabe hackers. They are looked down
upon in the hacker community because they are the people that make
hackers look bad. Script kiddies usually have no hacking skills
hackers without any knowledge of what’s happening behind the scenes.   

Intermediate hackers -
                              These people usually know about computers, networks, and have enough
 knowledge To understand relatively what a hack might do, but same as script kiddies
 they use pre developed well-known exploits

Elite Hackers
                              These are the skilled hackers. They are the ones that write
the many hacker tools and exploits out there. They can break into systems
and hide their tracks or make it look like someone else did it. You should
strive to eventually reach this level.

Wednesday, 16 July 2014

what is ethical hacking?

Hello Geeks,
                   This is yogesh again here to teach you something as i promised you to start Free online ethical hacking classes, now i am back with the articles and amazing videos of ethical hacking and penetration testing. here is my first article in this series of free online ethical hacking classes.

                             First of all Unless you know how to hack, you cant know how to protect yourself from hackers. I am (yogesh vishwakarma) providing you Free ethical hacking and penetration testing tutorials here. i will also provide you guide to enter the world of ethical hacking and penetration testing.
we will understand this thing with an example, suppose you are living in a room or flat with your friend and he has a laptop.
will your friend give you the laptop's password?
never, because you have heard "HAR EK FRIEND KAMINA HOTA HAI!!!!"
but one day he leave the laptop in room and if you are a hacker what will you do is break the password of laptop's user password, right?
and he also told you when he did access you please don't open the D Drive
now what will you do is open the D Drive first, am i wrong that way?
a big NO!!
so this is the characteristics of an hacker!
now in the second condition your same friend forgot his laptop's password and you are a hacker oops sorry this time ethical hacker so he will come to you and will say "please help me out i forgot the password i will give you the treat"
Again you will do the same procissor for breaking the password but this time you are a ethical hacker because you did the things with the owners permission and also for helping him.
so now
what is ethical hacking and penetration testing ?
 Hacking in ethical way (with the owners permission) or hacking for helping an individual or a company. ethical hacker find the weak points called "loopholes" or "vulnerability". organizations hire ethical hackers for testing their system's security for minimize the security breaches or loopholes.

   Being ethical hackers you need to remember these things :
1. you have to permission to test the network, system, website or server to identify the breaches adn vulnerabilities.
2. don't forget to take a form of no objection.
3. you have to respect privacy of particular company or individual.

sometime ethical hacker can be part of criticism by people, they will say there is no thing like ethical hacking is always hacking, no matter how you are doing all these things.
the term hacker is actually a good word media and some people has banded this word and think "hackers are like theif, they steal information and personal accounts passwords."
NOTE: please give a review for this post via comment below, these valuable comment will encourage me to write more and more free articles for you!!!

Wednesday, 26 February 2014

Big News!! Nokia introduced a New Android Phones

Today Nokia introduces a brand new family of smartphones, the Nokia X family, a range of handsets that combines Nokia design, build quality and services with the ability to run Android apps.

The first three phones in the family – the Nokia XX+ and XL – are priced between 7600 INR to 9300 INR.

Check the specification

Nokia X
Nokia X+
Nokia XL
4-inch IPS LCD, 800 x 480px

4-inch IPS LCD, 800 x 480px
5-inch IPS LCD, 800 x 480px

Up to 32GB
Up to 32GB
MicroSD; 4GB card included
Up to 32GB
MicroSD; 4GB card included
Rear camera
3-megapixel fixed focus
3-megapixel fixed focus

5-megapixel with autofocus and flash
Front camera
8225 Qualcomm Snapdragon
1GHz Dual Core
8225 Qualcomm Snapdragon
1GHz Dual Core

8225 Qualcomm Snapdragon
1GHz Dual Core
ESGM 850 / 900 / 1800 / 1900
WCDMA 900 / 2100
ESGM 850 / 900 / 1800 / 1900
WCDMA 900 / 2100

ESGM 850 / 900 / 1800 / 1900
WCDMA 900 / 2100
115.5 x 63 x 10.4mm
115.5 x 63 x 10.4mm

141.3 x 77.7 x 10.8mm

Standby time
2G = Up to 28.5 days
3G = Up to 22 days
2G = Up to 28.5 days
3G = Up to 22 days

2G = Up to 41 days
3G = Up to 26 days
Talk time
2G = Up to 13.3 hours
3G = Up to 10.5 hours
2G = Up to 13.3 hours
3G = Up to 10.5 hours

2G = Up to 16 hours
3G = Up to 13 hours

The Nokia X will be available to buy immediately in Asia Pacific, Europe, india, Latin America, the Middle-East and Africa. The Nokia X+ and XL are expected to be available from Q2 2014. The prices quoted do not include any local taxes or operator subsidies.


We will give you more news when new update come in market from Nokia