Key Loggers
Key logger is a tool to record every keystroke on an damaged machine for restoration. The purpose of key loggers is to allow the user to gain access to restricted information typed on the machine like user password and further private data. Virus-, trojan- and rootkit- are the methods that used by some key loggers to stay active but invisible. Nevertheless, some key loggers used legitimate ways or enhance computer security.
Computer Worm
Computer worm is kind of virus for self- replicating program that generate through computer networks without user intervention.
Computer Virus
It is also a self-replicating program that develops by placing copies of itself into other inconceivable code or documents. Thus, the viruses develop like biological virus whereby inserting itself into living cells.
There will be more new hacking techniques appear as new machinery products were made and hacking techniques are non-stop upgrading to creep into one medium. Lately, there's even a hack in cables that majority happens in modem. Ryan Harris, a cable-modem hacker reveals the method of hacking firmware by uncapped a cable modem to let the user to remove bandwidth filters imposed to increase the speed of modem and get free service.
Sources:
Hacker (computer security) - Wikipedia, the free encyclopedia. 2014. Hacker (computer security) - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Hacker_(computer_security) [Accessed: 13rd December 2013]
Alleged Accomplice of Accused Cable-modem Hacker Testifies Against Him. Threat Level. Wired.com. 2014. Alleged Accomplice of Accused Cable-modem Hacker Testifies Against Him. Threat Level. Wired.com. [ONLINE] Available at: http://www.wired.com/threatlevel/2012/02/ryan-harris-trial/ [Accessed: 15th January 2014]
Computer Worm
Computer worm is kind of virus for self- replicating program that generate through computer networks without user intervention.
Computer Virus
It is also a self-replicating program that develops by placing copies of itself into other inconceivable code or documents. Thus, the viruses develop like biological virus whereby inserting itself into living cells.
There will be more new hacking techniques appear as new machinery products were made and hacking techniques are non-stop upgrading to creep into one medium. Lately, there's even a hack in cables that majority happens in modem. Ryan Harris, a cable-modem hacker reveals the method of hacking firmware by uncapped a cable modem to let the user to remove bandwidth filters imposed to increase the speed of modem and get free service.
Sources:
Hacker (computer security) - Wikipedia, the free encyclopedia. 2014. Hacker (computer security) - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Hacker_(computer_security) [Accessed: 13rd December 2013]
Alleged Accomplice of Accused Cable-modem Hacker Testifies Against Him. Threat Level. Wired.com. 2014. Alleged Accomplice of Accused Cable-modem Hacker Testifies Against Him. Threat Level. Wired.com. [ONLINE] Available at: http://www.wired.com/threatlevel/2012/02/ryan-harris-trial/ [Accessed: 15th January 2014]
No comments:
Post a Comment