What is hacking, anyway?

  • Shadow Knight
  • Professor
  • Professor
  • User avatar
  • Posts: 948
  • Loc: Soy Cubano, no puedo ser diferent!!

Post 3+ Months Ago

its there anyway to find out if you have been hack? any computer logs left behind by the hacker? ... or any other thing?
  • Anonymous
  • Bot
  • No Avatar
  • Posts: ?
  • Loc: Ozzuland
  • Status: Online

Post 3+ Months Ago

  • meman
  • Web Master
  • Web Master
  • User avatar
  • Posts: 3432
  • Loc: London Town , Apples and pears and all that crap

Post 3+ Months Ago

They like to write thier names on things, so if you see something like:
"pw3d by s0m3 h4ck3r !1 shouts out to Oth3r h4ck3rz !!1one" then you have been hacked.

PC's should have a good firewall installed and the logs checked every now and again.
The logs will show all incoming and outgoing stuff, local/remote ports.

The ironic thing is the crap hackers get caught and are obvious, and the good ones are in and out without a trace and wont do any damage.
So if theres no reason to think you have been rooted you shouldnt worry about it.
  • Shadow Knight
  • Professor
  • Professor
  • User avatar
  • Posts: 948
  • Loc: Soy Cubano, no puedo ser diferent!!

Post 3+ Months Ago

Thank you memam
  • sky
  • Banned
  • Banned
  • sky
  • Posts: 23
  • Loc: uSa

Post 3+ Months Ago

"Hackers"

Some people get confuse with the names Hackers and Crackers

Hacker = make, destroy, modify and play around with pc code or (cell phones, Game Console, TiVO, etc...) that are electronics not only PCs. They are like kids. They like to see how things work. Their many type of hacker in this world.
- Whit Hat = Good hacker
- Black hat = Bad Hackers (steal information, espionage, install backdoors, virus and Trojans). When they take it to the next level with illegal stuff they are not hacker any more they are criminals.
- Real HK = White and Black Hackers that they superHackers that they hide from the dark corners of the Internet.

Crackers = break codes or fine easy solutions to bypass any security measures of a network or particular computer system to gain unauthorized access.

Post Information

  • Total Posts in this topic: 34 posts
  • Users browsing this forum: No registered users and 3 guests
  • You cannot post new topics in this forum
  • You cannot reply to topics in this forum
  • You cannot edit your posts in this forum
  • You cannot delete your posts in this forum
  • You cannot post attachments in this forum
 
 

© 1998-2014. Ozzu® is a registered trademark of Unmelted, LLC.