Archive for April, 2013

V for Vendetta and Anonymous

Posted: April 24, 2013 by drazsz in Uncategorized

I’m sure you most of you have watched the movie V for Vendetta and you can see some similarities between the goals of V from the movie and Anonymous of course Anonymous also wears the Guy Fawkes mask.  Even though V doesn’t hack like Anonymous or use any type of computers he’s trying accomplish the same thing Anonymous wants. In the movie he is creating chaos and forcing the government to pay attention and for the people to see the truth and rise up against corruption and control. Anonymous on the other hand is making chaos in a different way and its not just one person but many. Anonymous is trying to make the government pay attention by hacking and making a point that they are not so protected that they are vulnerable. They are proving just like in the movie that they can do the things they do because they can. You can see a few clips from the trailer here.

“People shouldn’t be afraid of their government. Governments should be afraid of their people” – V for Vendetta

Advertisements

8. Go and Check Out Your Computer Right Now!

Posted: April 5, 2013 by chrischanhui in Uncategorized

you've been hacked

 

Windows have more various contents than Mac.

But, it is more risky, and exposed to hacking.

To avoid hacking, what can we do?

For this time, I will give you some simple tips to avoid hacking.

 

change_password

First, change password to complicated one.

You might think your password is very safe and hackers never find it.

However hackers would not think like that.

Visit this site and check how secure your password is.

 

qwdwqd

It will give you some tips.

 

asd

Second, do not download equivocal Active X

ActiveX is the technology which used to develop the object-oriented components by Microsoft.

There so many kinds of ActiveX, these components would provide you more contents on internet.

But because of its multiformity, some hackers plant hacking files like Trojan on this.

Internet Explorer is also decent but I recommend you to use Google Chrome or Firefox.

 

pe

Third, do not write your personal information on the internet

It is super easy to search information today (thanks Google).

So, if you note your phone number or address, someone could abuse that.

 

Simple way to erasing hacking tool (Windows only)

wqeqwe

First, press start and open Windows exec cmd (if you can not find it, you can just type cmd and search)

1

 

You may see this, if you open cmd.

Type cd.. and enter twice

3

 

After enter twice, the front part would change to C:W>

Type del usp10.dll lpk.dll midimap.dll midimap 32 .dll imm32.dll comres.dll /a /s

4

 

After wait few minutes, you would see this screen.

If it said it erased something, it is better to change your password of your accounts.

 

 

I think the best way to avoiding hacking is downloading vaccine and let it scan while you use computer.

 

 

7. Types of Hacking

Posted: April 5, 2013 by chrischanhui in Uncategorized

hacker

As technology evolves, there are diversifying the kinds of hacking.

People no longer save important file as the form of paper, they save it in their computer.

It means, if you hack other’s computer, you may find valuable information.

640x392_33843_250005

Yesterday, the international hacker group Anonymous hacked North Korea social accounts.

(if you want to see more about it, click here)

Last year, North Korea warned that they would attack South Korea.

I was not quite sure they would really attack South Korea. Because this pattern is routine in recent years.

But after 3rd nuclear bomb test on 12 February 2013, North Korea move to make war.

So, Anonymous was angry with North Korea’s head Jung en  Kim who threat the security of the world.

hack

Anonymous hacked North Korea’s social network accounts and personal information of members of the site.

Due to their work, “North Korea’s provocation to world” became popular.

Anonymous have been make so many issues through hacking.

You guys might curious how they hack and the types of hacking.

For this time, I will give you information about the types of hacking .

I did not know and have not hear the hacking terms aside from DDoS. So, I searched some ways.

1) DDos (Distributed Denial of Service) attack

You may see this DDos attack on the newspaper, blog or somewhere these days.

I want to say DDos attack is the most easy way of “hacking”.

Strictly speaking, DDos attack is not hacking, but it is the first step to hacking.

DDos Attack

Just like the picture, put inordinate traffic or abnormal access on the victim server.

Due to this work, the hacker could monopolize the server.

Because of this waste of resources, the server could not sustain itself and could not provide normal service.

It is very easy, so there so many tools to use DDos attack on the internet, you may find and download it (be careful the virus!)

2) SYN flood

This way abuse the vulnerability of connection process of TCP, 3-way handshaking.

Basically, communication between the server and the client configured by three-step structure.

243px-Tcp_normal.svg

First, the client initiates the connection by sending information to the server, such as a serial number and packet size.

Second, the server responds with the information by sending the client session.

Lastly, the client agree on the information received from the server.

477px-Tcp_synflood

Sending thousands of messages to require TCP connecting (SYN). At this time, changing the IP address to one no longer use.

Then the server would response as SYN/ACK (which is not work or exist) to make the new contraction.

At this time, server would wait till ACK coming from the client which respond SYN/ACK, but the server would not get ACK message.

As the result, server would keep open till get the ACK respond, and the system would be down and the server quit the service itself.

3) Sniffing

Dog sniffing

You can imagine a dog is sniffing to find bones which he smuggled.

The way to sniffing is starts with wiretap the network packet.

asd

Collecting packet information which is not encrypted.

This way is more closer to stocking or information thief.

omg...

I give you three examples of hacking.

If you want to try hacking, visit here.

제목 없음

Hack this site

Seems very attracted to people who are interested in hacking.

That hacking means legal hacking and this page is for the people who want to study how to protect their computer from the hackers, not the malicious intrusion like cracker.