Friday, April 1, 2011

First of all we need to know that what is ethical hacker?


An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing and red teaming. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat. 
One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems. According to Ed Skoudis, Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common outside the government and technology sectors where it began. Many large companies, such as IBM, maintain employee teams of ethical hackers. 
In a similar but distinct category, a hacktivist is more of a vigilante: detecting, sometimes reporting (and sometimes exploiting) security vulnerabilities as a form of social activism. 

And now what is ethical hacking?
Ethical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems. While the non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other reasons, the ethical hacker evaluates them, points them out, and may suggest changes to systems that make them less likely to be penetrated by black hats. White hats can work in a variety of ways. Many companies utilize ethical hacking services from consultants or full-time employees to keep their systems and information as secure as possible. 
The work of ethical hacking is still considered hacking because it uses knowledge of computer systems in an attempt to in some way penetrate them or crash them. This work is ethical because it is performed to increase the safety of the computer systems. It’s reasoned that if a white hat can somehow break the security protocols of a system, so can a black hat. Thus, the goal of ethical hacking is to determine how to break in or create mischief with the present programs running, but only at the request of the company that owns the system and specifically to prevent others from attacking it.
People enter the field of ethical hacking in a variety of ways. Many people are very computer savvy and many, but not all, have an educational background in computer science. In some instances, the white hat has gained his or her experience by first being a black hat.
If black hat hacking was at a sufficiently criminal level, the black hat turned white hat may have served jail time before resuming a career in a more productive and positive way as an ethical hacker. The computer world is peopled with former black hats, who now hold ethical hacking jobs. Conversely, some white hats, such as Steve Wozniak, never committed any illegal acts, but simply possess the know-how and skills to analyze problems with any computer system.
With increasing use of the Internet and concerns about its security, especially when it comes to things like consumer information or private medical details, there is considerable need for computer experts to work in ethical hacking. Even sites owned by organizations like the US government have been hacked in the past, and concern about information theft remains incredibly high. Designing impenetrable systems or identifying the current weaknesses of a system are vital parts of keeping the Internet safe and information private, and even with the present legion of ethical hackers that perform this work, there is still more work to do.



The above article posted by Mr. Sachin Chauhan Ics
Hi guys many of us want to hack our friend pc. so we need to get their IP adress in order to hack him.once if we got his IP adress we can easily hack his pc.so in this post i am telling how to get the IP adress of friend while chatting.




IP is an address used by a person to connect to the internet. An Internet Protocol address also mean the identity of the person in the World Wide Web. Internet Protocol also has the information of location where the person is stays and connects to internet. If the person who connects to internet doesn’t use proxy, we can track the location of her or his country by knowing his IP (Internet Protocol Address). Internet Protocol Address sometime can also track the city where the person location is. 

Sometime when we are chatting with a friend via Private Message or Instant Message (PM or IM), we curious where the place of our friend is. If you using official yahoo messenger it is an easiest way to find your friend Internet Protocol address. Please read my tutorial below carefully and I guarantee you will be able to track and find the Internet Protocol Address of your friend.

First step we must to do is get a PM or IM with your friend user name or id. Then try to send a file (picture, mp3, etc), then wait until your friend accepted your file and your file begin transferred to him. If your and your friend connection has a huge bandwidth, I suggest you, to send a bigger byte of file. You also don’t have to do this step if you have their web cam yahoo messenger. After you done this thing, do the next step below (you can do this step before send a file).

Go to the command prompt application. If you don’t understand just follow this step (windows XP):

Start >> Run >> cmd >> Enter

Or

Start >> Programs >> Accessories >> Command Prompt

You will see a windows command prompt appear. Then write a command “netstat –n” or netstat –a” and press enter. Please note that the symbol “ not included when you type that command. You will see information under Active Connections list of Proto, Local Address, Foreign Address and State.

Active Connections indicate the connections being connected to your computer. Proto show the protocol you use to. Local Address refers to Internet Protocol in you LAN connection. Foreign Address indicates the Internet Protocol connection that connect to you and the port they used.

Now you just to seek a remote port that used by foreign address. Usually remote port 80 or 81 is used to transfer a file. Remote Port 5050 used for private message. And 5100 used for web cam. And Remote Port 5000 or 5001 used for voice chat.
The IP address of PM not the real IP of your friend. It belongs to yahoo server IP. But if you send a file or receive a web cam you will be get a real IP of your friend address because yahoo use Peer to Peer connection to service this utility.

sharp ip getter

If you want a better way to get Internet Protocol of your friend, there are many software that designed and developed to get IP address. One of this software I ever tested and worked is Sharp IP Getter. We do not need to send a file or get a web cam to know the Internet Protocol of your friend. We only need have Private Message.

about sharp ip getter:

Sharp IP Getter is an application that has a purpose to find Internet Protocol of Yahoo Messenger through Instant Message Service. Whenever you chat with people in Yahoo Messenger Private Message or Instant Message, Sharp IP Getter will help you to find the real IP address of the current people or user that being chat with you. Sharp IP (Internet Protocol) Getter was developed and created by Www.Sharp-Soft.Net.

How to find IP address from Yahoo Messenger chat? How to find ip address of a person in yahoo messenger? how to get ip in yahoo messenger? how to find ip address from instant message in yahoo messenger?. Those all questions might be ask from people who wanna know how to get ip address from yahoo messenger.

Actually there is a simple steps using command prompt windows to find ip address from chat in yahoo messenger, but this is not the good time We give you that such ways, to get ip of Y!M, because without that steps, with Sharp IP Getter you already knew how to look for the IP address of a user or people in yahoo messenger.

How to use Sharp IP Getter:

Just run the software and instantly you will see a list of IP address in the software. That IP address should be the one / people who chat with you. If you are unable to see the IP, make sure you send a file or image aka photo to the target and the IP address of the target will rise at Sharp IP Getter.



The above article posted by Mr. Sachin Chauhan Ics
Yeah its true !!!! You can start recieving checks weekly . Simply join us and start your earnigs!!!! 
U CAN JOIN US:


* If u are student
* If u are graduate
* If u are jobless
* If u are profetional
* If u are web developer
* If u want to start your buissness.
 


No basic skill or knowledge is required..we will give u traning and certificate and many more stuffs..



Stop googling the ways of earnings..............Just call me and c how your life change.....You can earn upto 80000 per month + 6000 per week (fix).

Just pick you cellphone and make a call......


Mukesh Tiwari

9200966216 / 09247991493



Sachin Chauhan
9958489879

This is weekly income of Gurkirat singh ..he did'nt do anything then also earning!!!!!!