Learn Ethical Hacking

Ankit Fadia is an internationally renowned independent computer security consultant who has authored several internationally best-selling books on Computer Security. Want to become an Ankit Fadia Certified Ethical Hacker?

The BBC says at 14 years of age, Ankit Fadia defaced the front page of an Indian magazine and sent an e-mail to the editor confessing to the hack and suggesting counter measures. He wrote a book on “ethical hacking” at the age of 15, becoming the youngest ever author to be published by Macmillan India.

Ankit Fadia Certified Ethical Hacker

Now you can be trained and certified by computer security guru Ankit Fadia himself. AFCEH or “Ankit Fadia Certified Ethical Hacker” course is a certification program on computer security. It is a computer security course that helps IT security professionals protect internet enabled computer security systems against cyber security threats and hacking. It helps people become more aware about cyber crime and IT security measures to counter it.

Continue reading

eLearning – Botnet

botnet

Botnet is a jargon term for a collection of software robots, or bots, which run autonomously and automatically. They run on groups of "zombie" computers controlled remotely by crackers. This can also refer to the network of computers using distributed computing software.

While the term "botnet" can be used to refer to any group of bots, such as IRC bots, the word is generally used to refer to a collection of compromised computers (called zombie computers) running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure. A botnet’s originator (aka "bot herder") can control the group remotely, usually through a means such as IRC, and usually for nefarious purposes. Individual programs manifest as IRC "bots". Often the command and control takes place via an IRC server or a specific channel on a public IRC network. A bot typically runs

Continue reading

I Was a Hacker for the MPAA

Exclusive by Wired.com

Promises of Hollywood fame and fortune persuaded a young hacker to betray former associates in the BitTorrent scene to Tinseltown’s anti-piracy lobby, according to the hacker.

In an exclusive interview with Wired News, gun-for-hire hacker Robert Anderson tells for the first time how the Motion Picture Association of America promised him money and power if he provided confidential information on TorrentSpy, a popular BitTorrent search site.

According to Anderson, the MPAA told him: “We would need somebody like you. We would give you a nice paying job, a house, a car, anything you needed…. if you save Hollywood for us you can become rich and powerful.”

In 2005, the MPAA paid Anderson $15,000 for inside information about TorrentSpy — information at the heart of a copyright-infringement lawsuit brought by the MPAA against TorrentSpy of Los Angeles. The material is also the subject of a wiretapping countersuit against the MPAA brought by TorrentSpy’s founder, Justin Bunnell, who alleges the information was obtained illegally.

The MPAA does not dispute it paid Anderson for the sensitive information, but insists that it had no idea that Anderson stole the data. “The MPAA obtains information from third parties only if it believes the evidence has been collected legally,” says MPAA spokeswoman Elizabeth Kaltman.

Read the full article

Arm your PC from Hackers

hacker.jpg

Hackers have newer methods to hack into your systems.They are smart enough to detect security loop holes in your PC and enter through open ports,unencrypted Wi-Fi connections,malicious websites or internet servers.It is better you check your PC periodically for invasions and protect your system to prevent pilfering and damage of data.

Read the following tools that will rescue your PC when it is in danger.

Detecting security loopholes

Paros :Scans Internet Traffic and identify if any website contains any malicious codes.

Netcat : Finds potential trouble spots in the network.

Network Scanner : Searches for open spots.

Angry IP-Scanner : Fast IP and port scanner.

Nmap : Shows open ports and logs.

AiO secretmaker : Protects from intruders.

Continue reading

The Great iPhone Hack, round 3

 

iphone_by_hynfaeries0.png

Two weeks to the day after Apple’s iPhone software update wiped third-party applications from the device and disabled unlocked phones, the hackers have struck back.

The Unofficial Apple Weblog posted details of the iPhone Dev Team’s latest effort, which once again opens the iPhone up to third-party applications and the ability to use it on any other GSM network than AT&T’s. This appears to be a more substantial effort than the one posted earlier in the evening that exploits a vulnerability in a TIFF image file; you can bet that one will be patched fairly quickly.

The latest hack allows iPhone users who have already installed the OS X 1.1.1 update to revert their iPhones to the previous 1.0.2 update, “jailbreak” it for third-party applications, and then somehow update back to the 1.1.1 version without the cell door slamming shut. TUAW and iPhone Atlas have tested the latest hack and have declared that it works, assuming you have a certain amount of knowledge of the iPhone’s command line interface.

Continue reading

How to Become a Free Software Hacker

Writing and using Free software is not just a programming, is a kind of philosophy. While programming language is all you need to program, this article is about how to join the community, get friends, do a great work together and become a respected specialist with profile you cannot get anywhere else. In a world of Free software you may rather easily get tasks that in a company only the elite, top level programmers are allowed to do. Think about the amount of experience this can bring. However if you once decided to become a Free software hacker, you must be ready to invest some your time into achieving this goal. This remains true even if you are an IT student already.

Steps

hacker

Continue reading