About Me

Real Infosys is the Fastest growing company in Information Technology Industries. We are Website, Software, Digital Marketing and Designing Company in Ahmedabad, Gujarat.

Tuesday, March 15, 2011

The Hacking

Definitions of Hacker


Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.
Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.
There are 2 types of Hommon among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.
There are 2 types of Hackers
1. Black Hat Hackers
2. White Hat Hackers (Ethical Hackers)
A black hat is the villain or bad guy, especially in a western movie in which such a character would wear a black hat in contrast to the hero's white hat.
The phrase is often used figuratively, especially in computing slang, where it refers to a computer security hacker that breaks into networks or computers, or creates computer viruses.
White hat describes a hacker (or, if you prefer, cracker) who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system's owners to fix the breach before it can be taken advantage by others (such as black hat hackers.) Methods of telling the owners about it range from a simple phone call through sending an e-mail note to a Webmaster or administrator all the way to leaving an electronic "calling card" in the system that makes it obvious that security has been breached.
While white hat hacking is a hobby for some, others provide their services for a fee. Thus, a white hat hacker may work as a consultant or be a permanent employee on a company's payroll. A good ackers
1. Black Hat Hackers
2. White Hat Hackers (Ethical Hackers)
A black hat is the villain or bad guy, especially in a western movie in which such a character would wear a black hat in contrast to the hero's white hat.
The phrase is often used figuratively, especially in computing slang, where it refers to a computer security hacker that breaks into networks or computers, or creates computer viruses.
White hat describes a hacker (or, if you prefer, cracker) who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system's owners to fix the breach before it can be taken advantage by others (such as black hat hackers.) Methods of telling the owners about it range from a simple phone call through sending an e-mail note to a Webmaster or administrator all the way to leaving an electronic "calling card" in the system that makes it obvious that security has been breached.
While white hat hacking is a hobby for some, others provide their services for a fee. Thus, a white hat hacker may work as a consultant or be a permanent employee on a company's payroll. A good many white hat hackers are former black hat hackers.
The term comes from old Western movies, where heros often wore white hats and the "bad guys" wore black hats.

Tuesday, March 8, 2011

About Me


Hello friends,
I would like to introduce myself.
I was born in 27th September ,1987 – India. I am Computer IT engineer. I am very honest and active in my life.
I started my career in Parity Computer Education. , Ahmedabad, I worked 1year and 6 Months for Partity  Computer Education.
 After leave of Parity Computer Education started to work for Reliance Industries Ltd (Jamnagar), I have worked 1year for RIL.
After that I have work in Academy for Computer Training (ACTUNIV) Pvt. Ltd as a Computer Trainer for 2 years and 8 months.
Currently I am working for Kemchho InfoTech Pvt. Ltd. (Ahmedabad).
Skills:
Computer Hardware, Networking, Data Collection, SEO(Search Engine Optimization), Cyber Security, Server Security, Server Management.
So, this blog is dedicated to all of my friend who is working in IT sectors and need to help about of all above subject and need to development.
Thanks, Looking for support because I am learning to write. Kindly comment on same topic.
I will write my next blog is on ethical hacking. will be publish soon
Thanks and Regards