- posted by
- 2023-02-07
Coimbatore Railway station to Isha Yoga Center Cab Fare:
Read moreAbout Hacking Information 24-Feb-2012. |
CoimbatoreTaxi News
Email or user information:These days the most commonly used and famous way of hacking user information like Emails, Passwords, Credit card details are as follow: a. Phishing b. Brute Forcing c. Keylogging d. Trojans a. Phishing: Phishing is basically a massive attack. What a hacker does is, they created an absoulutely look alike page of some website like yahoo or gmail. They upload it to their own server. And give the link to any n00b user. When they open it, they think that they are on the yahoo or gmail page, they put in their username and password, click on submit and WHOA! your information has been submitted. This is widely used by new people trying to entering into ahcking world.b. Brute Forcing Brute forcer is basically a program which could be called as a "cracker". In brute focer you put the username you want to hack, and as a password you put a notepad file which has almost all of the existing english words in it. So what it does is, it will try each and every word from that file and see if anything matches. You might have noticed some topics like "huge pass list" on different forums, they are nothing but the password list to put into your bruteforcer.!c. Keylogging Keylogger helps you to create a little filed which is known as "server". You gotta send your server to the victim. he has to click on it and then YOUR DONE! this is what happens.d. Trojans: Trojans are like father of keyloggers. Trojan sends you the keylogs just as keyloggers, on top of that, it lets you take the control of victim's computer. Edit / delete/ upload / download files from or to their computer. Some more funny features like it will make their keyboard go mad, it may kep on ejecting and re-inserting the cd ROM. Much more.. CoimbatoreTaxi News |