Jumat, 30 April 2010

Scurity: Hackers World Know

Aang Yogya security post, To some people, hearing the word "hacker" or "hacking" alone makes chilling shiver of fear. Hacking activities in general it has been identified with evil deeds, whereas the real purpose of hacking is to find security holes penetrated prone. Any technology as a double-edged knife, could be used for good, but also a crime. This paper attempts to decipher what was actually hacking activities, and how we can use them for our common good. In carrying out its action, the work of a hacker is identical to an attempt to tamper with the cmd on windows operating system and shell on linux operating system. Why use the cmd and the shell? Because in the cmd shell and have access to take over the authority without limit for the system with the provisions of hacker candidates must know and understand the function of what is in cmd and shell. A hacker can be categorized as a hacker is smart and creative in its operations if the hacker is not much use tools that help smooth the action. As an initial capital to move into the world of hacking, it is obligatory to learn the contents or purpose of the information displayed in the Cmd and shell. To find out what a command that can be used in Cmd and the shell you can do with typing "Help" or "Info" in the Cmd and the shell will display data that serves as a command in the Cmd and shell like the example in Figure 1.0 results from cmd when typing "Help": In the cmd on windows will dinampilkan all functions available in the cmd and also explained what the functions of his orders. If still confused of the purpose of the let command cmd in together immediately wrote practiced as for ways to practice are as follows: To find the IP Address from the command window can be done by typing "ipconfig / all" will display data in the form of information such as IP Address

White blocked text above is what is called an IP Address and IP Address to see in linux is done by typing the command "ifconfig" will display the same data as instructed to display the IP Address on Linux machines. Like the picture 1.2. On the other side hackers also claimed to be active and creative in finding other commands that have not been there in Cmd and in the Shell. After the candidates with advanced hackers can master it then it could be said the hackers were eligible to move into a higher level such as using a function of the ping, nmap, telnet and other sebaginya, where each of these functions or cruise mempuyai rooting ability of its own. As far as a hacker still has the willpower to try and try again until successful, not impossible if one day he will be able to explore this virtual world without borders, without finding the wall that is too high or too 'hot' for his passing.