Tuesday, 12 July 2022

Famous Hackers Of All Time

 

Jonathan James

Jonathan James was an American hacker. He is the first Juvenile who send to prison for cybercrime in the United States. He committed suicide on 18 May 2008, of a self-inflicted gunshot wound.

In 1999, at the age of 16, he gained access to several computers by breaking the password of a NASA server and stole the source code of International Space Station, including control of the temperature and humidity within the living space.

Kevin Mitnick

He is a computer security consultant, author, and hacker. He infiltrates his client's companies to expose their security strengths, weaknesses, and potential loopholes. In the history of the United state, he was formerly the most wanted computer criminal.

From the 1970s up until his last arrest in 1995, he skillfully bypassed corporate security safeguards and found his way into some of the most well-guarded systems like Sun Microsystems, Nokia, Motorola, Netcom, Digital Equipment Corporation.

Mark Abene

Mark Abene is an American Infosec expert and Entrepreneur. He is known around the world by his pseudonym Phiber Optik. Once, he was a member of the hacker groups Legion of Doom and Master of Deception. He was a high profile hacker in the 1980s and early 1990s.

He openly debated and defended the positive merits of ethical hacking as a beneficial tool for the industry. He is also expert in penetration studies, security policy review and generation, on-site security assessments, systems administration, and network management, among many others.

Robert Morris

Robert Morris was the creator of the Morris Worm. He was the first computer worm to be unleashed on the Internet. The Morris Worm had the capability to slow down computers and make them no longer usable. Due to this, he was sentenced to three years probation, 400 hours of community service and also had to pay a penalty amount of $10,500.

Gary McKinnon

Gary McKinnon is a Scottish systems administrator and Hacker. In 2002, he was accused of the "biggest military computer hack of all time". He has successfully hacked the network of Navy, Army, Air Force, NASA system of the United States Government.

In his statement to the media, he has often mentioned that his motivation was only to find evidence of UFOs and the suppression of "free energy" that could potentially be useful to the public.

Linus Torvalds

Linus Torvalds is a Finnish-American software engineer and one of the best hackers of all the time. He is the developer of the very popular Unix-based operating system called as Linux. Linux operating system is open source, and thousands of developers have contributed to its kernel. However, he remains the ultimate authority on what new code is incorporated into the standard Linux kernel.

Torvalds just aspire to be simple and have fun by making the world's best operating system. Linus Torvalds has received honorary doctorates from University of Helsinki and Stockholm University.



Wednesday, 6 July 2022

What Is Ethical Hacking

Hacking

Gaining access to a system that you are not supposed to have access is considered as hacking. For example: login into an email account that is not supposed to have access, gaining access to a remote computer that you are not supposed to have access, reading information that you are not supposed to able to read is considered as hacking. There are a large number of ways to hack a system.
In 1960, the first known event of hacking had taken place at MIT and at the same time, the term Hacker was organized.



Ethical hacking

Ethical hacking is also known as White hat Hacking or Penetration Testing. Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system or data. Ethical hacking is used to improve the security of the systems and networks by fixing the vulnerability found while testing.
Ethical hackers improve the security posture of an organization. Ethical hackers use the same tools, tricks, and techniques that malicious hackers used, but with the permission of the authorized person. The purpose of ethical hacking is to improve the security and to defend the systems from attacks by malicious users.


Types of Hacking

We can define hacking into different categories, based on what is being hacked. These are as follows:

  1. Network Hacking
  2. Website Hacking
  3. Computer Hacking
  4. Password Hacking
  5. Email Hacking
  1. Network Hacking: Network hacking means gathering information about a network with the intent to harm the network system and hamper its operations using the various tools like Telnet, NS lookup, Ping, Tracert, etc.
  2. Website hacking: Website hacking means taking unauthorized access over a web server, database and make a change in the information.
  3. Computer hacking: Computer hacking means unauthorized access to the Computer and steals the information from PC like Computer ID and password by applying hacking methods.
  4. Password hacking: Password hacking is the process of recovering secret passwords from data that has been already stored in the computer system.
  5. Email hacking: Email hacking means unauthorized access on an Email account and using it without the owner's permission.

Advantages of Hacking

There are various advantages of hacking:

  1. It is used to recover the lost of information, especially when you lost your password.
  2. It is used to perform penetration testing to increase the security of the computer and network.
  3. It is used to test how good security is on your network.

Disadvantages of Hacking

There are various disadvantages of hacking:

  1. It can harm the privacy of someone.
  2. Hacking is illegal.
  3. Criminal can use hacking to their advantage.
  4. Hampering system operations.

What Is Software Testing

 

Software Testing

Software testing is a process of identifying the correctness of software by considering its all attributes (Reliability, Scalability, Portability, Re-usability, Usability) and evaluating the execution of software components to find the software bugs or errors or defects.

Software testing is the process of evaluating a system with the intent of finding bugs. It is performed to check if the system satisfies its specified requirements.




Why is testing required?

Software Testing as a separate activity in SDLC is required because-

  • Testing provides an assurance to the stakeholders that the product works as intended.
  • Avoidable defects leaked to the end-user/customer without proper testing adds a bad reputation to the development company.
  • The separate testing phase adds a confidence factor to the stakeholders regarding the quality of the software developed.
  • Defects detected in the earlier phase of SDLC results in lesser cost and resource utilization for defect resolution.
  • The testing team adds another dimension to the software development by providing a different viewpoint to the product development process.
  • An untested software not only makes software error-prone, but it also costs the customer business failure too like in case of Microsoft’s MP3 player – Zune’s crash.

Who does Testing?

Testing is/can be done by all technical and non-technical people associated with the software. Testing in its various phases is done by-

  • Developer – Developer does the unit testing of the software and ensures that the individual methods work correctly.
  • Tester – Testers are the face of software testing. A tester verifies the functionality of the application as a functional tester, checks the performance of the application as a Performance tester, automates the functional test cases and creates test scripts as an automation tester.
  • Test Managers/Lead/Architects – Develop and define the test strategy and test plan documents.
  • End users – A group of end-users do the User Acceptance Testing (UAT) of the application to make sure the software can work in the real world.