FAQ

"Hacker Returns" - Frequently Asked Questions:


1. What is Computer Security?
Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done.

2. Why Should I care about computer security?
We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider your communications "top secret," you probably do not want strangers reading your email, using your computer to attack other systems, sending forged email from your computer, or examining personal information stored on your computer (such as financial statements).

3. What is the difference between a worm and a trojan?
A worm is a self-replicating piece of code that doesn't require the user to take action in order to activate it. It infects a machine, and then goes looking for other machines to infect, all the while unattended and most likely unnoticed by the user. Worms are typically self-contained; i.e. they don't infect other files.

A trojan is a program that appears to be something it's not; typically something interesting, amusing or beneficial.

4. What is Cloud Computing?
Gartner defines cloud computing as "a style of computing in which massively scalable IT-related capabilities are provided 'as a service' using Internet technologies to multiple external customers." Beyond the Gartner definition, clouds are marked by self-service interfaces that let customers acquire resources at any time and gt rid of them the instant they are no longer needed.

The cloud is not really a technology by itself. Rather, it is an approach to building IT services that harnesses the rapidly  increasing horsepower of servers as well as virtualization  technologies that combine many servers into large computing pools and divide single servers into multiple virtual machines that can be spun up and powered down at will.

5. What is Hacking?
  • The Art of exploring various security breaches is termed as Hacking.
  • Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.
  • In a world of Black and White, it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the Digital world has many types of Hackers.
  • Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline. The best broad description of Hackers is that all Hackers aren’t equal. Each Hacker has Motives, Methods and Skills. But some general characteristics can help you understand them. Not all Hackers are Antisocial, Pimple faced Teenagers. Regardless, Hackers are curious about Knowing new things, Brave to take steps and they are often very Sharp Minded.
6. Who is Hacker?
  • Hacker is a word that has two meanings:
  • Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring and Learning how Computer systems operate. They love discovering new ways to work electronically.
  • Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals are Crackers as Criminal Hackers. Crackers break into systems with malicious intentions.
  • They do it for Personal gain, Fame, Profit and even Revenge. They Modify, Delete and Steal critical information, often making other people's life miserable.
  • Hacking has a lot of meanings depending upon the person’s knowledge and his work intentions. Hacking is an Art as well as a Skill. Hacking is the knowledge by which one gets to achieve his Goals, anyhow, using his Skills and Power.
  • Most people associate Hacking with breaking law, therefore calling all those guys who engage in hacking activities to be criminals. We agree that there are people out there who use hacking techniques to break the law, but hacking is not really about that. In fact, hacking is more about following the law and performing the steps within the limits.

0 comments:

Speak up your mind

Tell us what you're thinking... !

Note: only a member of this blog may post a comment.

Popular Posts