AD (728x90)

Powered by Blogger.

Some Text

Sunday 15 May 2016

What is Hacking ?

Share it Please


Hack, a small but powerful word which means “Use a computer system to gain unauthorized access to another computer system”. There are several definitions for the word hacking but the one that perfectly fits is “Hacking is the process of breaking the security for unauthorized access.” In this particular definition a word comes security that refers to any software, program or any other thing that prevents unauthorized access.

When we start the run to access some secure information or data without the will and wish of owner there come a big hurdle in our way that is password. Password is encrypted combination of numbers, alphabets and special symbols that only allows the authorized user to access the system. Since the invention of password it is the first preference for the data security as it is comparatively more trustworthy, reliable and secure. Even though we have developed many more systems and methods for the data security but still 99% systems relay on the passwords for the security. Thus it becomes necessary to understand the passwords.

Password is just one way to access the secure data on any computer, server or any other device other than that there are many more ways that can be used for gaining access to any system which are also known as Back Doors. Back door hacking is a way where the hacker has to have a deep look over the complete system and tries to access the system without password like by finding a week security point. Suppose you are a thief and you are planning to enter a house, what you will do if you are unable to use front door for entering the house? Off course you will look for the backdoor or any open window that can easily let you access the house. In the very same manner the password is front door the any system and all other ways comes into backdoors. Usually these backdoors doesn’t let the owner or authorized user to know about the unauthorized access besides this these backdoors are the week and unsecure points of any system that a person who know well about the security system can easily exploit.

Whenever we are planning to hack any system the very basic thing that we need to understand is the security system. If you think hacking is easy or just include some tools to exploit a secure system you are wrong. There are several tools that are used in the process of hacking but it is not definite that those tools are perfect for the operation that we need to perform and that is the reason a good hacker dependent upon his own created and modified tools. Let us take an example to understand what hacking actually is and how a hacker hacks.

Let us suppose a website xyz.com whose database we need to access in an unauthorized manner without the knowledge of the owner of the databases. Today most of the systems works on PHP and MySQL for managing the databases let’s assume same about this particular system. Now the website must be hosted on some server that is secure with a encrypted password. Now the first thing that you need to understand is how the security system of this particular server is working. Have you ever think about the web pages that we are accessing they are also placed at the same place and if we can access these web-pages then why not other data? Here comes permissions, as public you can only access those data that owner is allowing you the data that we need to access is not public so how can we access it ? If you are well aware about the security system you might not be thinking this but you must be working on the way that can be used to exploit. What if we can proof to the system that we are not public but the authorized user of the data and this is what we are going to learn in our journey to become a professional hacker.

We will start with the basic of hacking with understanding the different kinds of security systems and the possible ways to expose them. In this journey you will be learning several new things as only unauthorized access is not hacking but it is when you access some data without coming in light and even there is no proof that you accessed it that is the complete hacking process. I consider the accessing some secure system just half of the process of the hacking complete process involves much more things like how can you prevent your IP address from being traced and even many more things like to modify the internal data without letting anyone know about it and cracking the security system whether it is a password, a robot, captcha, any software or program. Hacking is a very wide subject and there is no end to it. I am personally researching and learning hacking from past 5 years and belief me every day I learn something new, sometimes great challenges comes in front of me and they may take even a month to solve that is what I feel hacking is a challenging game.

A good hacker needs to have some essential qualities and these qualities make a person perfect hacker and I hope you will develop these qualities soon. These qualities are not birth these will be developed with time and the most important one decision making power and the time management, a hacker always need to respect time as in the hacking world even a second is very important and sometimes we have to perform some tasks even in mille-seconds and when the time is less you obviously need good decision making power. You can read more about the qualities of a good hacker in one of my post.

Hacking is a very wide subject which has no end and a real hacker is one who keep exploring and learning new things.


Written by

I am Ayush Tyagi, A Blogger who is living a dot com lifestyle by exploring new ways to make money on the internet. I am always enthusiastic to share everything that can help you to make money on the internet and build your own dot com lifestyle.

0 comments:

Post a Comment

COPYRIGHT © 2015-16 Ayush Tyagi. All rights resevered.