In the world of hackers, there are many terms that you should know. it is interesting to follow its development but over time this knowledge will become extinct without history.
World hacking it is unique and interesting to follow its development. However, there are many terms in the hacking world that we don't understand. Therefore, JalanTikus help explain. As you know, not long ago the attacks were Distributed Denial of Service (DDoS) against serverDyn causes Internet services to crash. Twitter is one of the most severely affected sites, because Dyn is a service company that provides Domain Network Services (DNS).
DDoS attacks themselves are said to have continued to increase in recent years. According to an independent security researcher Brian Krebs, the Internet is predicted to be flooded with attacks from many botnet new. This condition is also supported by more and more devices that are vulnerable to being hacked.
- Danger! In One Year DDoS Attacks by Hackers Up 214%
- 10 Hacker Software to Perform DDoS Attacks
- 7 Ways to Become a Real Computer Hacker
10 Terms in the Hacking World that You Must Know
For information, a DDoS attack is an attempt to make a computer system unusable by its users. The trick is to take advantage of thousands of fake activities that are used to attack the system simultaneously. Furthermore, here are 10 terms in the world of hacking that you must know.
DDoS or Distributed Denial of Service attacks are a type of attack carried out by hackers against a computer or computer server in the Internet network. The way it works is by spending the resources owned by the computer until the computer can no longer perform its functions properly. As a result, this indirectly prevents other users from accessing the service from the attacked computer.
2. Dark Web
There are two types of websites, namely: normal website which most people use every day because it is easily accessible and indexed by search engines. Then there is Dark web i.e. hidden websites that will not appear when you search on search engines like Google, and cannot be accessed without software special.
This dark web is part of Deep Web that is part of world wide web but not included in the Internet which can be searched easily using a web search engine index. Deep Web is different from Dark Internet (Darknet), where computers can no longer be reached via the Internet, or by Darknet which is a network for exchanging data, but can be classified as a small part of the Deep Web.
exploit is a code that attacks computer security specifically. Exploits are widely used for penetration, both legally and illegally to find vulnerabilities on the target computer. It can also be said as software that attacks security vulnerabilities (security vulnerabilities) and is specific. However, this does not always aim to launch an unwanted action. Many computer security researchers use exploits to demonstrate that a system has a vulnerability.
The reason is, there is indeed a research body that works with producers software. The researcher is tasked with finding the fragility of a software and if they find one, they will report the finding to the manufacturer so that action can be taken immediately. However, exploits are sometimes part of a malware tasked with attacking security vulnerabilities.
Deface is a technique of replacing or inserting files on server what can be done because there is a system security hole security on an application. The purpose of Deface is to make changes to the appearance of the website with the appearance owned by the user defacer. In a way, Deface was an attack made to changing the visuals of a website. Hackers usually leave messages and nickname them so that their work is known by the public.
Phishing is the act of obtaining personal information such as user ID, passwords and other sensitive data by impersonating an authorized person or organization via an email. The emergence of the term phishing comes from the English word fishing (which means fishing), in this case fishing target to provide important information such as financial information and password which he has.
6. SQL Injection
SQL Injection is a type of hacking action on computer security where an attacker can get access to database in the system. SQL Injection is an attack similar to an XSS attack, the attacker takes advantage of vector applications and also common in an XSS attack.
Backdoor is a mechanism implanted by hackers and managed to do compromise. As for the purpose for bypass computer security so that at a later time it can be easier to access the attacked computer without the owner knowing.
Keylogger is software installed or installed on the computer to record all activities that occur on the keyboard. Keylogger working quietly and hard to see with the naked eye.
Hacktivist is a hacker who uses technology to promulgate a social, ideological, religious, or political message. In more extreme cases, Hacktivists are used as a tool to cyberterrorism.
Sniffing is the activity of tapping and/or inspecting data packets using sniffer software or hardware on the Internet. This activity is often referred to as passive security attack by reading data roaming the Internet, and filtering specifically for host with a specific purpose.
That's latest update hacker attack and terms used in the world of hacking. Hackers in Indonesia themselves in the world of hacking have no doubts about their abilities, do you want to be one of them?