We Computers Master's

Well currently i am 18 years of old and study a lot about computers.. I have lot of knowledge regarding the Different types of programmable languages {C , C++ , C# , .NET , JAVA},softwares , Networking , all types of operating system's from MsDos to Linux.I have knowledge of hacking,cracking a lot. I put We computer Master's because all of you who will read this must have knowledge may be a lil bit more or a lil bit less but all you people have knowledge so i put it We computers Master's....

Make "We Computers Master's" your Homepage

Contact Me
Via Orkut

RupeeMail, It pays !!

Subscribe Now

Labels

• • • • • • •

Cracking (12) DOS (command Prompt)(14) E-mail Tips and Tricks (2) Google Tips and Tricks (10) Gtalk Tips and Tricks (13) Hacking (42) Internet Explorer (10)

• • • • • • • • • • • • • • • • • Keyboard Shortcuts (12) Make Money (5) Mobile (10) Mozilla Firefox Tips and Tricks (10) Msn Hacks (6) Orkut (35) Other (53) Registry Tips and Tweaks(30) Run Command's (3) SMS (5) Virus (18) Web Designing (1) Windows Vienna (1) Windows Vista (57) Windows XP Tips and Tricks (157) X box (3) Yahoo (6) Subscribe via email Top of Form Enter your email address: Subscribe Delivered by FeedBurner Bottom of Form Get paid to blog about the things youlove!!! Best search engine!!!! Top of Form Search Bottom of Form .

Blog Archive • ► 2008 (70) • ▼ 2007 (284) ○ ► December (32) ○ ▼ November (124)  Hack Megaupload !!  Orkut Hacking Same as Cookie Stealer !!  How to Change your Processor name !!  Some Javascripts of Orkut !!  Hide User Account !!  Login through Cookies in Orkut !!  Menu Delays !!  Lock Out Unwanted Users !!  Hacking websites !!  Some More Registry Tips and Tweaks !!  Tips and tricks for Windows Registry !! .

 Make your Desktop Icons Transparent !!  Remove Stored username and Passwords !!  Custom Folder to My Computer or the Desktop !!  Play Music in G talk !!  Install Windows Media player 11 !!  remove shared documents folder !!  Unlock Toolbars !!  700 mb picture taken by Hubble Space Telescope!!  The No1 Paying Money Site In India !!  Recover the lost administrators password !!  Turn-off right mouse click on your desktop !!  Optimize your Hard-Disk !!  Two Windows on the Screen Simulataneously !!  Set Volume Level for each Application !!  Multiple Clock Time Zones !!  An introduction to hacking !!  How to Hibernate In Xp !!  Hide the users on the Welcome Screen !!  Make Your Cd Autorun !!  Methods Of Cracking Any e-mail Passwords !!  How to Hack (Basic Tips To Start Hacking ) !!  How to install programs & games in a limited accou.  Removing Orkut Virus !! ..... Secret Backdoor !!  Introduction of IP Addresses !!  Hide your IP using Proxy Server !!  How to Defeat Java Script Protected Sites !!  Danger of ''ctrl+c'' in web !!  Remove Windows Messenger From XP !!  Speed Up Win XP !!  Some Registry Tricks !!  Stop the automatically rebooting after Windows Upd.

 Uninstall / Turn off unneeded features !!  Use Mobility Center !!  Stop autostart applications !!  Run as administrator start menu keyboard trick !!  Tweak your mouse scroll wheel !!  Use path wildcards to save time in explorer and co..  Windows Media Center keyboard shortcuts!!  Free up Disk Space by deleting backup files!!  Extend Activation period past 180 days!! .... Recover the Scrath Cd's !!  Automatic Login in Vista !!  In XP and VIsta Rename Multiple Files !!  Add your Name in the system Time !!  Disable User Account Control (UAC) !!  Yahoo Chat Commands and some tricks !!  Add the Run command to Start menu In Vista!!  Delete Browsing History In Vista!!  E-xtended Disc Cleanup !!  Registry !!  Hacking of Firefox Cache !!  Disable Right Click on Start Menu!!  How to clear Google Search history!!  Hide Secret Messages in Images !!  Block USB in Windows XP !!  Test if your antivirus is working properly !!  Shut Down your computer in 3 Seconds !!  Make your computer shutdown at a desired time !!  Automatically Close any non-responsive programs!!  Hide your files in a JPEG file!!  Mount a Cd Image !!  Free up more space on your computer!!  Fix: No Screensaver with Microsoft Wireless Laser .

..  Add A Windows XP Logon Wallpaper !!  Make a folder dissapear even from ctrl+A !!  Dos Tricks and Shortcuts !!  Change DOS color !!  Windows game Cheats !!  Speed up Booting Xp by 70 Times !!  Clear CMOS all Tricks !!  Close Multiple Windows !!  Change the Default Opening Folder in Windows Explo...dll ...sys virus!!  Donwload "Internet Explorer 7" Without WGA Check !.  Do Not Highlight Newly Installed Programs !!  Turn Off Autoplay for Program CDs !!  Easily Disable Messenger  Browser's Earthquake!!  Testimonial Flodding !!  Make Your page Colorfull !!  Multiple Voting script!!  Vote for an option 31 times !!  Check your scraps without logging in !! . Permanently Activate Windows Vista !!  15 tips and tricks for enhancing your Vista experi.  Showing Super Hidden Files In Windows Vista  Tabs in Yahoo Messenger !!  Services Provide By yahoo !!  Trick to disable the Orkut logout Script !!  Hidden Notepad feature (As a log file creator) !!  Shutdown pc from dos prompt !!  How to remove the security alert icon from the sys..  Restriciting Logon Access !!  Burn to 800MB CD-R !!  Get DOUBLE Speed in Brod band net !!  Making ..

..  Big Text box in Scrap book !!  Set Any Video as Desktop Wallpaper  Add your name To the Right Click of the Computer !.. I am in both of the fields of computer Hardware as well as Software . Types Of Hacker !!  Hacking Via Windows Utility!!  Add any one from Orkut a moderator of your communi. So i like to gave all the information i have of computers to all the world so i create this blog.. CCSP. I am a student of BCA(Bach. and doing Networking also. CCIE . 2007 Types Of Hacker !! . and doing MCSA . MCSE ... INDIA Hello friends my name is Marshal . i am 18 years old and this year i passed my 12th grade. and after doing all this i will do CCNP .  Pay to read sms !! ○ ► October (33) ○ ► September (7) ○ ► August (88) About Me MARSHAL LUDHIANA.  Virus Code in Pascal !!  Install Internet Explorer 7 !!  Download Unlimited from Rapidshare!!  Enable Right Click on websites !!  Earn money by sms !!  Earn Money !!  Get paid to read sms or invite your friend 100% tr. of ComputerApplications) 1st year . {I am sorry} :-) View my complete profile FRIDAY. This is my first time i have create a blog so if any mistake i done ... NOVEMBER 9..exe file !!  Start a Movie In a Paint !!  How to find Sender's IP from the Received E-mail !. PUNJAB.  How to Create . CCNA .

The term is derived from American western movies. a person who is ethically opposed to the abuse of computer systems. In computer security. The primary difference between white and black hat hackers is that a white hat hacker claims to observe the hacker ethic. also rendered as ethical hacker. The negative form of the noun "hack" is even used among users of the positive sense of "hacker". and grey hats. where the good cowboy typically wore a white cowboy hat and the bad cowboy wore a black one. and can delve into obscure . This usually refers to a black hat hacker. a hacker is a person able to exploit a system or gain unauthorized access through skill and tactics. white hats are often intimately familiar with the internal details of security systems. Many such people are employed by computer security companies. or to perform some other altruistic activity. In other technical fields. inelegant. hacker is extended to mean a person who makes things work beyond perceived limits through their own technical skill. and security-related items. and a white hat might need to break into a black hat's machine in the course of an investigation. these professionals are sometimes called sneakers. There are also white hats (ethical hackers). A white hat generally focuses on securing IT systems. including computer programming. whereas a black hat (the opposite) would like to break into them — but this is a simplification. In computer programming. Groups of these people are often called tiger teams. administration. Like black hats. What exactly differentiates white hats and black hats is open to interpretation. such as a hardware hacker. a hacker is a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. A white hat hacker. A black hat will wish to secure his own machine. is. and inefficient. but white hats tend to cite altruistic motivations. The term white hat hacker is also often used to describe those who attempt to break into systems or networks in order to help the owners of the system by making them aware of security flaws. in the realm of information technology.A hacker is a person who creates and modifies computer software and computer hardware. Realizing that the Internet now represents human voices from all around the world makes the defense of its integrity an important pastime for many. or reality hacker. For some Hacker has a negative connotation and refers to a person who "hacks" or uses kludges to accomplish programming tasks that are ugly.

In computer jargon the meaning of "hacker" can be much more broad. Usually a Black hat is a person who maintains knowledge of the vulnerabilities and exploits they find as secret for private advantage. Many Black Hats promote individual freedom and accessibility over privacy and security. The name comes from the opposite of White Hat hackers. This simply means how the Red Hat Hacker thinks : hat (Fire) Intuition opinion emotion (subjective) This simply means how the Yellow Hat Hacker thinks: hat (Sun) Praise positive aspects (objective) A black hat (also called a cracker or Darkside hacker) is a malicious or criminal hacker. Black Hats may seek to expand holes in systems. not revealing them either to the general public or the manufacturer for correction. any attempts made to patch software are generally to . This term is seldom used outside of the security industry and by some modern programmers. The general public use the term hacker to refer to the same thing.machine code when needed to find a solution to a tricky problem.

refers to people who attempt to gain unauthorized access to computer systems. One group that refers to themselves as hackers consists of skilled computer enthusiasts. A Black Hat hacker may have access to 0-day exploits (private software that exploits security vulnerabilities. This term's use is limited (as well as "black hat") mostly to some areas of the computer and security field and even there is considered controversial. Many members of the first group attempt to convince people that intruders should be called crackers rather than hackers.is actually software cracking). but the common usage remains ingrained. In the most extreme cases. 0-day exploits have not been distributed to the public). usually with the intent of accessing computers connected to the network (the somewhat similar activity of defeating copy prevention devices in software . and more common usage.which may or may not be illegal depending on the laws of the given country .prevent others from also compromising a system they have already obtained secure control over. This simply means how the Green Hat Hacker thinks: hat (Plant) Alternatives new approaches everything goes (speculative) This simply means how the Blue Hat Hacker thinks: hat (Sky) Big Picture Conductor hat Thinking about thinking Overall process (overview) . Black-hat hacking is the act of compromising the security of a system without permission from an authorized party. The term cracker was coined by Richard Stallman to provide an alternative to abusing the existing word hacker for this meaning. The other. and/or make threats to do so for blackmail purposes. Black Hats may work to cause damage maliciously.

intrusion testing. . a term that comes from old Western movies. 2. So instead of tagging it black hat. To test a security system. and is becoming increasingly common outside the government and technology sectors where it began. Ethical hacking is also known as penetration testing. to a grey hat. They are a hybrid between white and black hat hackers. is a skilled hacker who sometimes acts legally and in good will and sometimes not. attacking corporate businesses with unethical practices could be regarded as highly unethical and would normally be considered black hat activity. ethical hacking has continued to grow in an otherwise lackluster IT industry. looking for exploits so they can be closed. However. One of the first examples of ethical hacking at work was in the 1970s. where the "good guy" wore a white hat and the "bad guy" wore a black hat. it is a grey hat hack. is usually classified as a grey hat. Individuals involved in ethical hacking is sometimes called a white hat. An ethical hacker is where a computer and network expert who attacks a security system on behalf of its owners. Many large companies. Grey hat in the computer security community.Refers to outside computer security consulting firms that are used to bug test a system prior to its launch. and red teaming. when the United States government used groups of experts called red teams to hack its own computer systems. such as IBM. Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice. it may not appear bad even though it is against that local law. seeking vulnerabilities that a malicious hacker could exploit. For example. maintain employee teams of ethical hackers. ethical hacking uses the same methods as their less principled counterparts. They hack for no personal gain and do not have malicious intentions. According to Ed Skoudis. 1. but report problems instead of taking advantage of them. but may or may not occasionally commit crimes during the course of their technological exploits. A person who breaks into a computer system and simply "plants his flag" while doing no damage.

you helped me with my research project on types of hackers. Crackers who rely on the latter technique are often referred to as script kiddies (unskilled crackers are far more common than highly skilled ones).1. Black-hat hacking is the act of compromising the security of a system without permission from an authorized party. An unethical hacker is a malicious or criminal hacker. 2. code injection and SQL injection bugs.. Common software weaknesses exploited include buffer overflows. The general public use the term hacker to refer to the same thing. race condition. usually with the intent of accessing computers connected to the network (the somewhat similar activity of defeating copy prevention devices in software .which may or may not be illegal depending on the laws of the given country . you got credit. This term is seldom used outside of the security industry and by some modern programmers. In computer jargon the meaning of "hacker" can be much more broad. Don't worry. cross-site request forgery. The name comes from the opposite of White Hat hackers. 2008 5:48 PM Post a Comment Newer PostOlder PostHome . integer overflow. cross-site scripting.. Posted by Marshal at 12:53 AM Labels: Hacking 1 comments: Anonymous said. format string attacks. April 3. Examples of Techniques used for breaking into systems can vary from using advanced programming skills and social engineering to using semi-automatic software developed by others without understanding how it works (script kiddies).is actually software cracking).. memory corruption. Nice information.

Subscribe to: Post Comments (Atom) Top of Form Search Bottom of Form ↑ Grab this Headline Animator I P N o w . O r g G a d g e t s p o w e r e d b y G o o g l e > .

Sign up to vote on this title
UsefulNot useful