Hacking FAQ’S

hack

 

Here I provide the answers for the most recently asked questions regarding hacking

Q.What is hacking?

A.Hacking is the art of breaking into computers to gain knowledge that our society has hidden from us. Hacking is illegal and the government spend lots of money each year to have hackers arrested…..when they should be spending the money on more important issues.

Q. What is a shadowed password?

A.A shadowed password is a cover for the real password file. It shows that the real password is hidden somewhere else.

Q.How do I crack shadowed passwords?

A.Cracking a shadowed password file is impossible. Assuming that you got the password file via anonymous ftp. You should try connecting to port 25 and doing the sendmail bug.

Q.What is the difference between an encrypted password and a shadowed password?

A.An encrypted password is just the real password scrambled and changed. It can be cracked with a password cracked and a word file. A shadowed password hides the encrypted password somewhere else other than the etc. dir.

Q. What is an exploit?

A.An exploit is something that exploits UNIX or another kind of OS. You usually use exploits to gain root or high access to a system. They can prove to be very handy.

Q. What are some basic telnet commands?

A.Below is a list of common telnet commands.

Command                                                                                    Function

access                                                                                             Telnet account
c                                                                                                        Connect to a host
cont                                                                                                 Continue
d                                                                                                        Disconnect
full                                                                                                    Network echo
half                                                                                                   Terminal echo
hangup                                                                                            Hangs up
mail                                                                                                     Mail
set                                                                                                    Select PAD parameters
stat                                                                                                 Show network port.
telemail                                                                                         Mail

Q. What is DNIC?

A. A DNIS says which network connect to the telnet you are using.

Q. What is NUA?

A.  The NUA is the address of the computer on telnet.

Q.  What is telnet?

A. Telnet is a program which lets you log in to other computers on the net.

Q. What is a virus?

A.  A Virus is a program which reproduces itself. It may attach itself to other programs, it may create copies of itself. It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. Some Virus scanners detect some Viruses. No Virus scanners detect all Viruses. Virus scanners will work for a while but people are always creating virii that will beat them.

Q.  What is a Trojan?

A.  A Trojan is a program which does an unauthorized function, hidden inside an authorized program. It does something other than it claims to do, usually something malicious, and it is intended by the author to do whatever it does. If it is not intentional, it is called a bug.

Q.  What do I need to become a hacker?

A.  You should start off with a good scanner, some dial ups  a telnet client, and some knowledge of hacking. Those are the basic things that you will need. If you are serious about hacking then you should get Unix, or Linux(smaller, free version of UNIX).

Q.  What is a sniffer?

A.  Taken from the Sniffer FAQ.
Unlike telephone circuits, computer networks are shared communication channels. It is simply too expensive to dedicate local loops to the switch (hub) for each pair of communicating computers.

 

 

 

 

Most Famous Ebooks For Hacking

The term life hack refers to productivity tricks that computer programmer devise and employ to cut through information overloaded and organize their data. In more recent times, the same phrase has expanded to any sort of trick, shortcut, skill, or novelty method to increase productivity and efficiency, in all walks of life; in other words, anything that solves an everyday problem in a clever or non-obvious way might termed as hacking.

I am here to provide you the best and most famous hacking eBooks.

-There are many Hacking Techniques in the present world.Here am going to provide the Techniques for few of the famous concepts.

Click Download to get the complete ebook for Hacking Techniques.

-Here am going to give you an UNIX  HACK tutorial to let you get more familiar with the operating system. UNIX is just an operating system, as is MS_DOS,AppleDOS,and others. UNIX happens to be a multi-user-multi-tasking system,Thus these eBooks will hopefully teach the beginners who do not have a clue about how to use UNIX a good start,and may hopefully teach old pros something they din’t know before.

Click Download to get the eBook “A Beginners guide to hack UNIX

Click Download to get the “UNIX Hacking tutorial

Click Download to get most read 250+ tech-books online.

-As we all are familiar with the Bit-Torrent, here am going to provide an eBook which provide a simple small tutorial on Bit-Torrent

Click Download to get the Tutorial guide on Bit-torrent

Click Download to get the eBook on “The Basic Guide On Internet”

Click Download to get the “20 Great Google Secrets”

-Most of us have many FAQ’S regarding the various concepts of hacking.I have picked the most frequently asked FAQ’S by the hackers.Have a look on them.

Click Download to get the eBook “Hacking FAQ’S