Real Hackers vs fake ethical hackers.

DISCLAIMER::THIS ARTICLE IS BASED UPON MY OWN OPINIONS.FOR EXAMPLE AS I SAY LINUX IS BETTER THAN WINDOW THAT MEAN IT IS MY OPNION.I AM NOT RESPONSIBLE FOR ANYTHING.

I am creating this thread to educate the guys who r realy interested in hacking but they are loosing their path due to some fake hackers so called "Ethical hacker".

These Fake "Ethical Hackers" uses both word ethical and hacking for their personal purpses.

This name "Ethical Hacker" looks cool.A great term to impress others(specially fo girls).Majority of them are self claimed hackers..They search some new trciks on internet and tell to peoples on under their own name and called it hack.Most of their hacks( i dont think they are hacks .but they call it hacks) are based on Registry editing like hiding drives using registry or changing IE window title using registry.

Also they Introduce u too some virus.Acc. to them which are very dangerous and illegel.These viruses are actually batch scripts most of time they add a"shutdown " on notepad and save it to notepad and place it in startup.ANd then says" DESTROY YOUR ENEMY COMPUTER,SHUTDOWN A COMPUTER FOREVER " also they said "DONT TRY TO HARM OTHERS WITH THIS UNDECTABLE VIRUS IT IS ILLEGEL AND YOU BE SENT TO JAIL FOR THIS CRIME"

ONE MORE STUFF THEY CALLED IT WEBSITE HACKING "SQL INJECTION" .They USE SIMPLE sql injection to impress people and show them they can hack a website".

i Want to mention "sql injection" is not a dark art anymore..u can find step wise step guides for sql injection on simply googling"

ALSO THEY SHOW u SOME OLD TROJANS, PROXY SITES IN THEIR SEMINARS SO CALLED "ETHICAL HACKING LIVE DEMONSTRATION"....They SPENT MOST OF THEIR TIME ON PROVING THAT INTERNET IS VERY HARMFUL FOR U .THEY SAY " HACKER CAN KNOW UR IP EASILY AND CAN HACK U,EVRY WEBSITE KEEP LOGS" blah blah etc.

SO FINALLY COME TO POINT ...A APEAL TO INDIANS...PLZZ DONT FOLLOW THAT GUYZ IF U WANT TO BE A REAL HACKER..THAT GUYZ WILL TURNS U INTO "SCRIPY KIDDY."

THAT FAKE GUYZ ALSO INSULTING TERM "ETHICAL HACKER".IN PRESENT TIME I FOUND LOT OF GUYZ WICH CLAIMING TO BE HACKER.These GUYZ THINK BUY USING 5-6 open sources automated testing tools they will become hackers.PLZ dont follow that guyz.They will Spoil ur creativity.

PROBLEM OF INDIANS

Acc. to ME INDIA got a gud study structre.We r producing 3-4 lakh computer engineers every year.

The prob is that we indian always go for marks.We study for marks. we use google for educational purpse when we need to complete your assignment.

We limts our domain to course books.IF anybody try to read extra books abt computer then other guyz start discourging that guy.

All these trciks related to registry,batch scripting can be easily find on google..they are easy things..

My advise to atleast spend 20-30 minutes on seraching these tricks.

MY special advise for programmers(As i want to be a gud c0der)

Dont use google until Your mind fails.

Google is harmful for you if u use this to copy other's work......it will vanish ur creativity(which is most important thing)

In programming there are lot of ways to doing samething....so try to find out solution in ur own way....does not care how much time it take.....only try to find out solution in your own way.

a gud example if u copy a code of virus from internet it is easily detected by Antivirus....But as i say there are many ways to doing same thing....IF u write same thing in your own way then it will be undtectbale.

WHAT HACKING IS??

(this is my old artcle)

A hacker is a person who breaks into computers and computer networks, either for profit or motivated by the challenge. The subculture that has evolved around hackers is often referred to as the computer underground but is now an open community

Other uses of the word hacker exist that are not related to computer security (computer programmer and home computer hobbyists), but these are rarely used by the mainstream media because of the common stereotype that is in TV and movies. Some would argue that the people that are now considered hackers are not hackers, as before the media described the person who breaks into computers as a hacker there was a hacker community. This group was a community of people who had a large interest in computer programming, often sharing, without restrictions, the source code for the software they wrote. These people now refer to the cyber-criminal hackers as "crackers".

THIS IS DEFINATION OF HACKING FROM WIKIPEDIA.

TODAY WE (HUMANS) ARE DEPENDING MORE AND MORE ON COMPTERS AND INTERNET.THEREFORE THE SECURITY IS BIGGEST ISSUE IN THIS DIGITAL WORLD.

I COME TOKNOW THAT 90% PEOPLES WHO WANT TO BE A HACKER JUST WANT TO HACK COMPUTER OR STEAL PASSWORD,STEAL MONEY OR MAY WANT TO IMPRESS THEIR FRIENDS .

THESE PEOPLE MAY SUCCEED IN THEIR GOAL AS THEIR ARE MANY SOURCES ON INTERNET WHICH PROVIDE STEP BY STEP GUIDES TO HACK A COMPUTER ,TO SET UP A TROJAN OR RAT.
BUT MOST OF THEM ENDED UP AS "SCRIPT KIDDY".

"SCRIPT KIDDIES" KNOW HOW TO HACK BUT THEY DON'T KNOW HOW THIS WORKS. THEY HAVE THEIR OWN SOURCES TO GET LATEST TROJANS,STEALERS .

THESE SCRIPT KIDDIES DON'T HAVE ANY FUTRE AS DEPEND UPON THIER SOURCES ONCE SOURCES ARE GONE THEN THEY BECOME JUST A ORDINARY COMPUTER USER.

IN MY WORDS "SCRIPT KIDDIES" ONLY KNOW HOW TO USE GOOGLE IN BETTER WAY(TO SEARCH FOR TROJANS,STEALRS)

SO DON'T BE A SCRIPT KIDDY.CONCENTRATE ON CONCEPT IT MAY TAKE MORE TIME BUT AT THE END U WILL FIND U AT A BETTER POSITION.

Essential thing for hackers

1) BASIC KNOWLEDGE OF COMPUTER HOW IT WORKS,HOW OS WORKS,COMPUTER ARCITECTURE AND OTHER CONCEPTS LIKE VIRTUAL MEMORY ,MAPPING ETC.

2)A CREATIVE MIND(THIS MAKES A HACKER DIFFRENT FROM SCRIPT KIDDIES)

3)PROGRAMMING .U MUST KNOW PROGRAMMING(WIN32 PROGRAMMING). I PREFER C/C++ ,U CAN ALSO TRY DELPHI .C/C++ IS BEST FOR EXPLOIT WRITING.ALSO YOU SHOULD KNOW SOME WEB SCRIPTING LANGUAGES LIKE PYTHON(IT IS NOT VERY HARD BUT VERY POWERFUL,ALMOST USED IN EVERY SCERITY TOOL) .U CAN ALSO TRY PERL.

4) REVERSE ENGINEERING.FROM MY POINT OF VIEW .THIS IS MOST IMPORTANT TO BECOME A HACKER. U NEED TO LEARN ASSEMBLY PRORAMMING TO BE REVERSE ENGINEER.BUT THIS IS MOST IMPORATNT PART.IT HELPS IN UNDETECTION TECHNIQUES,ANLAZING VIRUSES,FINDING SECURITY LOOPHOLES ETC. IT IS VERY VAST FIELD.PRORAMMING KNOWLEDGE IS NECESORY FOR RE.

5) LAST THING U NEED IS A GUD INTERNET CONNECTION.(LOLZ).FROM THIS I MEAN U SHOULD BE AWRAE WHAT IS HAPPENING IN THIS DIGITAL WORLD.

ALSO U NEED SOME BOOKREADING

TOP MOST INDIAN FAKE "ETHCAL HACKER " IS ANKIT FADIA...I WILL WRITE A ARTCILE ON THAT GUY WHEN I HAVE TIME

FINAL WORDS

1)SCRIPT KIDDIES PATH STARTS FROM GOOGLE AND ENDS AT few password stealers,phising etc.)

2)A AVG HACKER PATH STARTS FROM GOOGLE ENDS AT CEH (video series related to ethical hACKING)

3)REAL HACKERS CREATE THEIR OWN PATH.WE ONLY KNOW STARTING POINT THAT IS "PROGRAMMING( first one is Assembly).AND THEIR IS NO END

COMMENTS

Name

©2012 Oceninfo.co.cc,2,10:29 IST,1,2012,1,Adfly Bot,2,AFCEH,1,Ajax security,1,all posts for education purpose only...www.facebook.com/princebhalani,1,Android,1,android developer,1,android phone,1,android phone-1,1,anonymous email,1,Anti-Trojan software,8,Antivirus,1,Apple,1,article marketing,1,at risk,1,attacks,1,australian federal police,1,Auto Clicker,1,Auto surfer,1,backtrack link,2,Bank Hacking,2,BCMSN,2,BIOS Update,1,Blockchain,1,Blog and tagged Ransomware,1,boot fast...,1,boot xp faster,1,Business Deals,1,Bypass Antivirus and Hack Window Systems,1,CCIE,2,CCNA,2,CCNP,2,CEH,2,challenge-response system,1,Changing Root Bridge Election Results,2,code,2,commands,1,company deals,1,Computer Hacking,3,Connect,1,cookie stealing,3,Country,1,Crack,1,Credit Card Fraud,2,credit cards,1,Cryptography,1,cyber cell updated,1,cyber security,1,DATA CARD TRICK,1,delhi,1,Digital Marketing,1,direct admission in any colleges,2,Direct Link,3,Directory Traversal Attacks,1,Dos and Ddos,1,DotNetNuke Remote File Upload Vulnerability,1,Earn Lots of money,3,EARN MONEY PART2,1,earnings in$,1,email hacking,4,email spoofing,2,Er Prince Bhalani jobs,1,Ethical Hacker job,1,ethical hacking,8,exploit,1,facebook autoliker,1,Facebook tricks,3,Fake Mail,1,fake sms,1,FB hackz,1,FBI,1,FBI HACKERS,2,FBI Jobs,2,featured,6,Finger scan,1,fingerprint Hacking,1,format without pain,1,Free Download,1,Free Flash Templates,1,free hacking book,5,Free Recharge,1,free sms,2,Freebeacon,1,friendship day,2,friendship day image,2,friendship image,1,Future Computer,2,future of hacking,1,Gadgets,1,good clean fun,1,google,3,Google Ads,1,google adsense account,1,Google hacking,3,google hacks,1,google search,1,hack,2,hack the world,2,HACK WEBSITES USING SQL INJECTION,2,hacker,1,hacker uni,1,hacker/LPT/etc,1,hackers,2,Hackerz info,1,hacking,4,hacking games,1,hacking matterial,1,HACKING OFER,1,hacking softwares,1,hacking tools,2,Hacking with Mobile phones,1,HackingTeacher Security Solutions,1,hacks,1,hijack,1,history of hacking,1,How to,8,How to Hack,37,how to play,1,How to sniff,1,html,1,HTTPS/SSL secured sites,1,I LOVE YOU VIRUS,1,i-phone hacking,1,ICITAM 2012,1,iCloud Era,1,In Flow,1,indian cyber cell,4,information security,1,interesting,1,inurl:fcklinkgallery.as,1,IP hacks,1,iphone,1,IT Act,1,IT Decision Maker,1,IT Implem_App/LOB Spec,1,IT Implem_Desktop/EndUser Spec,1,IT Implem_Infrastructure Spec,1,IT Implem_IT Generalist and IT Manager.,1,it security,1,java,1,jobs for ethical hacker,3,jobs in hacking,5,Joe job,1,Just for education purpose only,1,Kaspersky,1,kaspersky crack 2013,1,keyboard hacking,1,keyloggers,1,keywords,1,Laptop Tracking,1,Laws of computer crime,1,Learn Cracking,1,Learn Website Hacking,7,Linkbucks Bot,1,Macromedia Flash,1,make some rules...|||_|||,1,malicious code,1,Malware,1,malware analysis,1,man in the middle attack (LAN),1,master,1,master list,1,metasploit,3,Microsoft scams,1,mobile,1,mobile recharge,1,moblie phone hacking,1,munging,1,network hack,1,Network Sniffers,1,new command set,1,new projects,1,nmap,1,No Survey,1,not infrequent,1,online scanners,1,paisa live hack,1,panetration for educational purpose only,1,Parental Controls,1,password hacking,4,Password sniffing with arp poisoning,1,PC TIPS,1,PE_PARITE (Trend Micro),1,penetration testing,1,pharming,1,phishing,1,phone hacking charged,1,PHP,1,pin ball,1,Play WMV Files,1,Press Trust of India / New Delhi Aug 15,1,Prime minister,1,prince bhalani,1,princebhalani,1,Professional job in FBI,1,Professional Penetration Testing,1,Programming,1,Programming of virus,2,protect my pc against hackin,1,proxy list by http,1,Proxy SOCKS Port,1,R-Admin With Key,1,Radmin,1,RAW Jobs,1,Real Hackers vs fake ethical hackers. ..:),1,Register of Known Spam Operations (ROKSO),1,repair corrupt hard disk,1,RFT,1,Robbery,1,Rupert Murdoch,1,SAMPLE,1,Sample dynamic flash template from TM website,1,Scams,2,Scanned Vulnerabilities,1,SEA,2,search engine hacking,1,Search Operators,1,Security,2,Security breach,1,security code brack,1,SEM,4,SEO,112,SEO Mistakes,1,SEO TOOLS,1,SEO Tricks,3,SERM,1,SERP,1,Session Hijacking,4,SET,1,shell commands...,1,shell list with download,1,SITES,1,Smart Home,1,Smartphones,1,SMM,1,SMO,2,sms spoofing,1,SMTP Servers,1,Sniffing passwords,1,Sothink SWF Decompiler,1,spam cocktail (or anti-spam cocktail),1,spam trap,1,spear phishing,2,SQL hacking,2,SQL Injection Attacks by Example,2,SSL,1,SSL Analysis,1,starting of help,1,System Information,1,System Restore,1,Tablet in 1000,1,Tablets,1,Temporary Email Service,1,time need,1,timer,1,tracing,1,Traffic,3,tricks,5,Tricks and Tips,1,Trojan,1,Trojan tools,1,Trojans and Backdoors,2,trojon,7,Turbo C++,1,UK phone hacking,1,UK phone hacking arrest,1,USA JOBS,4,Virus,2,virus writing,2,VPN,1,vulnerabilities,1,vulnerability assessment,1,W32/Pate (McAfee),1,W32/Pinfi (Symantec),1,Washington,2,web hacking,6,web security,1,Website Development,1,Website Hacking,3,White House,1,wifi hacking,3,Win32 : parite (Avast),1,Win32.Parite (Kaspersky),1,Win32/Parite,1,windows,2,Windows 8 event for IT Professionals,1,wirless hack,1,WordPress,1,WordPress hacking,1,working with Virus and worm,9,XP Hacking,1,xp hacking-1,1,XP part 3,1,xss hacking,1,
ltr
item
Group Of Oceninfo: Real Hackers vs fake ethical hackers.
Real Hackers vs fake ethical hackers.
Group Of Oceninfo
https://oceninfo.blogspot.com/2011/10/real-hackers-vs-fake-ethical-hackers.html
https://oceninfo.blogspot.com/
https://oceninfo.blogspot.com/
https://oceninfo.blogspot.com/2011/10/real-hackers-vs-fake-ethical-hackers.html
true
6415817773321450103
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy