Thursday, March 18, 2010

Search Engine

Google search engine is one of the advance search engine among all.
It is also one of the fastest search Engine and provide more then thousand result.

Google services and tools.
  • Google provide blog search, images news and maps and books.
Try the search engine now by clicking the google now!

Wednesday, March 17, 2010

Forum via LMS


A forum discussion in the MPCIM LMS system,
it is compulsory for us to get involved in every single discussion that had been post by any of the student.
this kind of activity is good and healthy as we can share and argue about some of the issue.
BUT!!!
not all of the information were true,
as we can see that some of the post have different opinion.
You can log into MPCIMLMS.

Hackers!

What do we know about hackers?
well,
before this, my knowledge on hackers are those people who broke into a system, whether they to it for fun or for their own need.
Recently, when I have to present about hackers, i just fount out that hackers can be in 3 group.
which is the Black hat hackers, White hat hackers and also Grey hat hackers. What are they really?

The Back Hat Hackers =
  • Black Hat Hackers (also called "crackers"), are hackers who specialize in unauthorized penetration. They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Such penetration often involves modification and/or erasing of data, and is done without authorization and hence they should not be confused with “ethical hackers” (see white hat hacker).

  • They also may distribute computer viruses, Internet worms, and deliver spam through the use of botnets. The term may also refer to hackers who crack software to remove copy restriction methods: copy prevention, trial/demo version, serial number, hardware key, date checks, CD check (NO-CD) or software annoyances like nag screens and adware.

  • The Black Hat Conference is a major conference dedicated both to learning (and potentially furthering) Black Hat techniques and also to understanding and preventing them.

The White Hat Hackers =

  • White hat hackers, also known as ethical hackers, or white knights, are computer security experts, who specialize in penetration testing, and other testing methodologies, to ensure that a company's information systems are secure. Such people are employed by companies where these professionals are sometimes called "sneakers."

  • Groups of these people are often called tiger teams or red teams. These security experts may utilize a variety of methods to carry out their tests, including social engineering tactics, use of hacking tools, and attempts to evade security to gain entry into secured areas.

  • The National Security Agency offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team management. Aggressor teams are called "red" teams. Defender teams are called "blue" teams.


The Grey Hat Hackers =

  • A grey hat, in the hacking community, refers to a skilled hacker who sometimes acts illegally, sometimes in good will, and sometimes not.

  • They are a hybrid between white and black hat hackers. They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.


Myspace Graphics