Monday 10 August 2009

Group 23 Task 2: Hacking

Group 23
NAVEEN VANAM
BHANU ANANTHUNI
PHANI ANNAM


Ethical Hacking:
'HACKER': A person who enjoys learning the details of computer systems and how to stretch their capabilities--as opposed to most users of computers, who prefer to learn only the minimum amount necessary.”
Taken From: Ethical Hacking, Palmer, C.C., IBM Systems Journal 2001, ISSN: 00188670 on 10-08-09.

What is ethical hacking:
Hackers want to be able to take advantage of the Internet for electronic commerce, advertising, information distribution and access, and other pursuits, but they are worried about the possibility of being "hacked".
Taken From: Ethical Hacking, Palmer, C.C., IBM Systems Journal 2001, ISSN: 00188670 on 10-08-09.

Who are ethical hackers?
Ethical hackers typically have very strong programming and computer networking skills and have been in the computer and networking business for several years. They are also adept at installing and maintaining systems that use the more popular operating systems (e.g., UNIX (**) or Windows NT (**)) used on target systems. These base skills are augmented with detailed knowledge of the hardware and software provided by the more popular computer and networking hardware vendors.
Taken From: Ethical Hacking, Palmer, C.C., IBM Systems Journal 2001, ISSN: 00188670 on 10-08-09.

What do ethical Hackers do?
An ethical hacker's evaluation of a system's security seeks answers to three basic questions:
• What can an intruder see on the target systems?
• What can an intruder do with that information?
• Does anyone at the target notice the intruder's attempts or successes?
The discussion begins with the client's answers to questions similar to those posed by Garfinkel and Spafford:
1. What are you trying to protect?
2. What are you trying to protect against?
3. How much time, effort, and money are you willing to expend to obtain adequate protection?
Taken From: Ethical Hacking, Palmer, C.C., IBM Systems Journal 2001, ISSN: 00188670 on 10-08-09.

THE ETHICAL HACK ITSELF:
Once the contractual agreement is in place, the testing may begin as defined in the agreement. It should be noted that the testing itself poses some risk to the client, since a criminal hacker monitoring the transmissions of the ethical hackers could learn the same information. The best approach to this dilemma is to maintain several addresses around the Internet from which the ethical hacker's transmissions will emanate, and to switch origin addresses often. Complete logs of the tests performed by the ethical hackers are always maintained, both for the final report and in the event that something unusual occurs. For example, an employee might want to try out some of the techniques for himself or herself. He or she might choose to test the company's systems, possibly annoying system administrators or even inadvertently hiding a real attack. The employee might also choose to test the systems of another organization, which is a felony in the United States when done without permission.
Taken From: Ethical Hacking, Palmer, C.C., IBM Systems Journal 2001, ISSN: 00188670 on 10-08-09.

Conclusion:
With the growth of the Internet, computer security has become a major concern for businesses and governments. As Roger Schell observed nearly 30 years ago, from a practical standpoint the security problem will remain as long as manufacturers remain committed to current system architectures, produced without a firm requirement for security. As long as there is support for ad hoc fixes and security packages for these inadequate designs and as long as the illusory results of penetration teams are accepted as demonstrations of a computer system security, proper security will not be a reality.

Group 14 Task 2: Hacking

Group 14
Chandrashekar Kalleda
Bharat Thota
Anil Kumar Reddy Kampally
Nageshwar Rao Nunna
Abhilash Raja
Ravi Kumar Gurram



What is hacking?
Hacking is word that to do some complex hardware and software programming and computers the programme is called hacker. These hackers are experts in the field of computing and have achieved a certain elite status within their field the other commonly know meaning of the word is someone breaks in to computer networks for his or her own purposes.

Traditionally, hackers were computer geeks who knew almost everything about computers both in hardware and software and were widely respected for their wide array of knowledge. In recent years the reputation of hackers has been steadily going down. At this time hackers are feared by most people and are looked upon as icons representing the underground community in the world.

Hackers know everything about the way software or an application works. Hackers have this uncanny ability of finding out ways of doing the impossible. “Recently a 13 year old hacker in the US who with his other hacker friend used to relish programming and hacking. These two people always enjoy breaking in to each other systems and proving their superiority. They both were imppensely intelligent and had the perfect mind needed for business.”

Types of Hackers:
• White hat hacker
• Gray or brown hat hacker
• Black hat hacker

White hat hacker: A person who is ethically opposed to the abuse of computer systems. Generally white hat focuses on securing IT Systems.

Black hat hacker: A person who will wish to secure his own machine and would like to break in to them. A Black hat refers to a person that maintains the knowledge of the vulnerabilities and exploits they find as secret for private advantage not revealing them either to the general public or manufacturer for correction. Many black hats promote individual freedom and accessibility over privacy and security.

Gray or brown hat hacker:
This type of hacker is a skilled hacker who sometimes acts legal in good will and sometimes not. This type of hackers is called hybrid hackers between White hat and black hat. There is no profit or personal gain and do not have malicious intensions but they may commit crimes in their actions.

All the loss in the world can’t and will not discourage computer criminals hackers are getting real smart these days and it is becoming increasingly easier for them to break in to a system, create a malicious and escape without living any trace behind. Laws are absolutely useless when system administrators themselves are becoming ignorant of computer security and are dismissing all hackers as people belonging to the dark side of society.

It has become absolutely necessarily to explain people as to how hackers are and how hacking is executed and how to protect computer systems from hackers. If above mention problems are not done as soon as possible then the hackers will get way ahead in the security ways.

If users are able to learn and can understand how someone break in our system then users would be in a better position to fix a security loop hole at the right time.

Group 9 Task 2: Hacking

Group 9
DILIP KUMAR VOLAM
RAVI KANTH SAMA
RAJASHEKAR MUSKU
RAGHUMA REDDY VAKITI



Hacking :
Hacking use of computer and networking resources. Hacking often is based on software bugs that a hacker can use to give him or her super user status. Hacking is a process of improving knowledge without any permission of users either it may be computer or computer network. Hacking is the breach of security system, usually pertains to someone gaining access to servers or database of any users. Hacking has taken a bit of a negative connotation, concerning people using backdoors, Trojans, etc. Hacker is a person who specializes in work with the security mechanisms form computer and network systems.

Types of hackers attack:
1. Viruses – most common form of attack
2. Denial of service attacks
3. Trojans
4. Brute force and social engineering password attacks
5. Port scanning and spoofing
6. Phishing
7. Ransomware

Effects of Hacking:
Computer hacking is a breach of computer security. Hackers may even delete sensitive information on gaining access to it. Delete or manipulation of sensitive data with intent to achieve personal gain is another effect of computer hacking. A user whose computer has been hacked is at the risk of losing all the data stored on his/her computer. Manipulation of sensitive user data is a grave consequence of hacking. Hacking can be used to convert computers into zombies that is internet enabled computers that are compromised by hackers or computer viruses. Some hackers are not harmful; they just want to prove themselves or to prove a point, but they won’t steal or destroy anything. Others are extremely dangerous they hack system even if it is bank, or online job, they might stealing money, credit card numbers, accounts.

Group 17 Task 2: Hacking

Group 17
Suresh Gopal
Krishna Mohan Gundavarapu
Jayesh Narani
Sudheer Pola



Hackers are highly skilled computer gurus who break into computer systems for a variety of reasons, from financial gain to just for the fun of a challenge. Despite these activities being illegal, the hacker community has maintained momentum for decades and shows no signs of slowing down.

Function: Hacking is an activity that is engaged in by people who use their knowledge of the internet, computers, firewalls and security preferences to break into other people's computers, allowing them to view private information, alter data and steal files, information or programs. MySpace pages, software applications and email accounts are the most common programs that are hacked into. Hackers typically look for passwords or credit card information. Some will simply hack into these programs in order to change information, such as a screen name, password or other content that is written by the owner.

Significance: Hackers are sometimes motivated by greed and steal personal information in order to take on someone's identity for their own gain, or in politics, where they try to exploit, blackmail or otherwise expose someone in power, or even just for entertainment, where hackers simply want to see what they are capable of doing. These types of hackers usually brag about their conquests on message boards or instant messaging programs, competing with fellow hackers as to who is the best among them.

History: The first case of hacking occurred in the 1960s when a group of students at the Massachusetts Institute of Technology (MIT) tried to access the school's main computing systems. In the 1970s, "phone phreaks" hacked into telephone networks and made toll-free calls. Mainstream computer hacking as we know it today gained momentum in the 1980s when hackers broke into what would now be considered message boards. Congress passed the Computer Fraud and Abuse Act in 1986, which made it illegal for anyone to break into anyone else's computer system. Despite the law, the 1990s saw the invention of the Trojan Horse, which allowed hackers to access any computer that downloaded the program. Many companies were hacked into as well, such as AOL, Yahoo!, Amazon and eBay.

Types: There are at least five main types of hackers. A hacktivist uses his hacker skills in order to broadcast a political message on the Internet. A cyberterrorist commits acts out of a desire to wreak havoc and cause harm to groups who he feels oppose him and his beliefs. A black hat typically breaks into a network in order to obtain information that will allow him to commit fraud or theft. A white hat may commit the same hacking acts as other hackers, but is not motivated by a malicious intent. A script kiddie uses hacking software in order to break into someone else's computer system. This software is usually obtained from another hacker who has figured out how to corrupt that specific program's system.

Features: Most hackers are talented computer programmers. They know how to write software and how to remove the kinks from other programs that are written by the hacking community. The most important feature of someone who hacks, however, is the "hacker mindset," a set of beliefs that the hacker community has established. The core belief is that it is OK to hack into someone else's computer and to obtain, distribute or otherwise exploit any information that may be found in the process. Hackers usually strongly believe in their First Amendment rights and believe that hacking falls under this umbrella.

Friday 24 July 2009

Group 7 Task 2: Hacking

Group 7:
UMADURGA KALVAKOLANU
BABU ALAPATI
DHARMENDRA BOGIREDDI
VENUMADHAV DUSA
PREETHI ADDLA
SUNITHA RAVI


HACKERS
“Hacker is a term used by some to mean "a clever programmer" and by others,
especially those in popular media, to mean "someone who tries to break into
computer systems.”

The term “hacker” tends to carry a mystique about it that ranges in definition
from anti-social computer genius to malicious virus writer. Thus, modern
hackers as defined in media stories tend to attack networks for identity theft,
to steal credit cards, extort banks , or launch denial-of -service attacks.
Brief definition of hackers A hacker is someone who gains unauthorized access to
a computer system. Many hackers just like the challenge of breaking through a
computer security system but not all hackers are harmless. It must also be said
that not all hackers are bad. Government and huge companies use hackers to
maintain their security systems. People normally confuse hackers with crackers.
While hackers crack the code of passwords to hack into a security system,
crackers crack the code of software to bypass its security mechanisms like
copyright protection etc. Hacking and cracking are two different methods, but
hackers normally possess cracking skills and crackers, hackings skills. Also
note that not all hackers are humans. You also get computerized hackers, but
they are developed by humans of course.
There are basically three types of hackers: Coders, Admins, and
script kiddies. This characterization is based upon overall competence and
ability to compromise computer technology, networks, protocols, and systems.

CODERS
Coders are programmers who have the ability to find unique vulnerabilities in
existing software and to create working exploit codes. These hackers, as a
whole, are not seeking publicity and are rarely part of front-page news
stories. As a result, they are known only to the security community for the
programs they write and the exploits they have uncovered.

Coders are individuals with a deep understanding of the OSI model and the TCP
stack. Coding is more than just a hobby, and they dedicate a great deal of time
and energy to it. They are committed to keeping their technical knowledge and
skills current. Not all coders are malicious. In fact, some are actively
involved in developing technologies that can be used to improve overall network
security, such as hackers from the ISS X-force, the Bind view Razor Team, and
the AXENT SWAT team.

Coders can work independently or through a network of hacking teams that run
exploits from a variety of locations, making it difficult to trace the
activities back to their source. These teams can be developed in Internet Relay
Chat (IRC) channels, in conferences such as DefCon, or in small groups of
computer savvy friends. Often coders create the programs and other members of
the team run them against target networks. This creates a reputation for the
group rather than a single individual.

ADMINS
Admins are far more common than Coders and may have experience with several
operating systems, understand TCP/IP, and know how to exploit several
vulnerabilities. They generally have less depth of knowledge but possibly
greater breadth than Coders. This level of hacker would be part of a security
team in a large organization. Some level of programming or scripting ability is
required. For example, they should be able to port a tool form on flavour of
Unix to another.

A majority of security consultants fall into this group. Admins have worked with
computers for most of their computer careers and understand how they work. They
have an extensive collection of tools, a reliable methodology, and ability, but
they generally rely on other people to identify and code most exploits due t
lack of time to specialize in a particular technology.

Admins like to play with new tools as soon as they come out and are often
beta-testers and part-time developers for freeware and open-source security
tools. They also found as regular contributors to security mailing lists or
post news articles online.

SCRIPT KIDDIES
The lowest and most populated part of the hacker pyramid is the Script kiddie.
Their name comes from the fact that members of this group generally rely on
previously coded scripts and pre-packaged hacking tools downloaded from the
Internet to do their hacking. Script kiddies are usually individuals who are
intrigued by the notion of gaining unauthorized access and a reopen to using
untested pieces of code, especially while others (target networks and users)
are at risk.

For this reason, script kiddies get the least respect but are often the most
annoying and dangerous. Script kiddies can cause big problems against networks
without truly understanding what the scripts do and what the consequences may
be. This combination of irresponsible experimentation and incomplete knowledge
often leads to disaster, such as the unintended loss of information.

Script kiddies do not necessarily have computer related professions. In fact,
given that they are often younger people on the Internet, they may still be in
high school. They run the code they find on the Internet on their office, home,
or school network. Script kiddies are generally precipitants of security mailing
lists, though they may not be regular contributors, and are often vocal in
hacker IRC channels. They spend most of their time surfing the Internet in
search of the latest and greatest automated hacker tools. Curiosity about how
the tools work and what information might be obtained leads to an unauthorized
security breech.

Sunday 19 July 2009

Group 19 Task 2: Hacking

Group No: 19
Salikuti Sandeepkumar Reddy
Nanada Kishore Sirugumalle
Murali Bhooma


Hacking:
Unauthorised use of computers and network resources is known as hacking. Gaining access to a computer or computer network without legal authorization. The goal of attacker would be complete system control. Firstly hacker attacks easy target and then by hiding his/her traces launches attacks on more secure sites and brings or gains complete control of the system. Hacker gains access to super-user account which allows availability to hide and also maximum access by which we can edit, install, delete or can execute any file in user’s directory.

The term” hacker” originally means a very gifted performer and hacking is defined as one who is proficient in programming a computer or using it; a computer buff. But in recent years by gaining easier access to multiple systems it now has negative implications which mean crackers which mean "One who uses programming skills to gain illegal access to a computer network or file."

There is lot of difference between hackers and crackers. Hackers are people who try to make things and crackers are a person who breaks things. Internet which is today is made by hackers who program or develop websites and they don’t harm them and work others done. But in today’s society hacker is popular in use as a cracker in thought and are using both hacking and cracking as methods of cracking. Hacking is a skill and not a very simple sequence of commands or either a simple operation. Approach of hackers must be changed and adopted depending on obstacles which come across. By harming people, their websites and work crackers get kick but real hackers get kick out of programming, helping and improving web. Crackers break software in order to distribute them for free. They do this to prove that they can do it.

There are different types of hacking:
1. Hacking hidden or password protected pages in a website.
2. Hacking other people's computers while they are online.
3. Hacking company servers to distribute viruses or read important information.

In all the above types in hacking least serious and easy thing is hacking hidden or password protected pages in a website. Although it is illegal some areas are legal. Many tools are available on internet which encourages this practice. When we create our own website the section protect your website will be of our own interest.

Hacking is illegal in most of the countries because it leads to piracy and damage. Damage can be either manually or through viruses. Computer can be made useless by deleting specific files. There are few counties which consider hacking as another advance in computer technology. Even where hacking is considered as legal the company, website or individual is based in country must abide the international rules.

Hackers spread viruses and destroy companies’ computers just for enjoyment. There is no reason for their spreading of viruses and they do merely because to show that they can do. Around the world there are many hacking tournaments every year. During tournaments companies monitor the systems 24 hours. There was a hacker’s challenge recently which lasted for 6 hours. It is easier to hack windows than Linux. And it is easier to hack with Linux as it is designed such that it allows users to issue any commands they want to. Companies’ installs virus filters and firewalls to prevent hackers from breaking into company files.

Saturday 18 July 2009

Group 13 Task 2: Hacking

Group 13
Anil Kumar Bheema
Venkata Ramana Chennoju


Computer Misuse
The Computer Misuse Act 1990 was designed to deter hackers -- see Ayres (1999).
There are several types of offence covered by this act, including:
• Hacking- breaking into computer systems without authorization
• Cracking- breaking or removing copy-protection on software
• Phreaking- exploring communications (telephone) networks to gain free access, calls or information. But with all computer misuse, the general rule is that prevention is better than cure--secure computer systems, passwords and cryptography provide a better solution than after-the-event laws and punishments, which should be considered only as a last resort.

Computer Crime and Legislation
Where the Internet is concerned, legislation is often the weakest form of protection. Since international boundaries are relatively meaningless, there are difficulties in defining the jurisdiction of courts.

What is Hacking?
Hacking is unauthorized use of computer and network resources. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it's OK. The key difference is that the ethical hacker has authorization to probe the target.

According to the Computer Crime Research Center, They said we work with IBM Consulting and its customers to design and execute thorough evaluations of their computer and network security. Depending on the evaluation they request which ranges from Web server probes to all-out attacks, we gather as much information as they can about the target from publicly available sources. As we learn more about the target, its subsidiaries and network connectivity, we begin to probe for weaknesses.

Examples of weaknesses:
Includes poor configuration of Web servers, old or unpatched software, disabled security controls, and poorly chosen or default passwords. As we find and exploit vulnerabilities, we document if and how we gained access, as well as if anyone at the organization noticed. In nearly all the cases, the Information Systems department is not informed of these planned attacks. Then we work with the customer to address the issues we've discovered.

The number of really gifted hackers in the world is very small, but there are lots of wannabes.... When we do an ethical hack, we could be holding the keys to that company once we gain access. It's too great a risk for our customers to be put in a compromising position. With access to so many systems and so much information, the temptation for a former hacker could be too great -- like a kid in an unattended candy store.

Types of Hacking

• Inside Jobs - Most security breaches originate inside the network that is under attack. Inside jobs include stealing passwords which hackers then use or sell, performing industrial espionage, causing harm as disgruntled employees, or committing simple misuse. Sound policy enforcement and observant employees who guard their passwords and PCs can thwart many of these security breaches.
• Rogue Access Points - Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. Local hackers often advertise rogue APs to each other. Rogue APs are most often connected by well-meaning but ignorant employees.
• Back Doors - Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in your network.
• Viruses and Worms - Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.
• Trojan Horses - Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus, password gobbler, or remote-control SW that gives the hacker control of the PC.
• Denial of Service - DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).
Distributed DoSs (DDoS5) is coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.
• Anarchists, Crackers, and Kiddies - Who are these people, and why are they attacking network?
- Anarchists are people who just like to break stuff. They usually exploit any target of opportunity.
- Crackers are hobbyists or professionals who break passwords and develop Trojan horses or other SW (called warez). They either use the SW themselves (for bragging rights) or sell it for profit.
- Script kiddies are hacker wannabes. They have no real hacker skills, so they buy or download warez, which they launch.
Other attackers include disgruntled employees, terrorists, political operatives, or anyone else who feels slighted, exploited, ripped off, or unloved.
• Sniffing and Spoofing - Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister. Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.

Hacker?
The term “hacker” can also mean just someone who programs in a particular way, or who just enjoys tinkering with computers; in some circles I'd describe myself as a hacker, though I don't attempt to break into computer systems (except my own!). Many hackers have campaigned for the term “cracker” to be used universally for anyone involved in illegitimate activity involving computers. I list the terms as above since that's how the Computer Misuse Act defined them.
There are three types of hackers
- White hat
- Grey hat
- Black hat
White hat hacker:
It finds a fault in a security system i.e. a website then they will inform the owner immediately.
Grey hat hacker:
It finds a fault he will do what he feels like at the time i.e. exploiting the site OR informing the owner.
Black hat hacker:
If they find a fault will immediately exploit the site for their own beneficial gain i.e. advertising and infecting other computers with "viruses" to gain access to more sites.
So a hacker can be many things from protecting systems by informing the owners or Exploiting and stealing data. The most common name for the destructive type of "hacker" is a "cracker" I always tries to refer to a bad hacker as a cracker to avoid confusion.

Ethical Issues of the Internet Revolution:
Society currently understands hacking to be a form of unlawful behavior and a medium for creative innovation. Hacking has become an activity that holds two positions and is therefore both solemnized for its insightful inventiveness and defamed for its devious acts.

The ethics behind hacking and the actions taken by hackers constitute a philosophical manifest that transcends our understanding of this art. Hackers argue that actions promote a means for tighter security by way of detecting flaws and patches for systems and software. However, these very actions are viewed as violations of rights to privacy and security for both individuals and organizations. Consequently, this establishes a cautionary attitude toward ethical issues such as, privacy, security and the future of the World Wide Web.

In order to comprehend the ethical and the moral principles underling the meaning of hacking one has to understand has t the roof f hacking. In hackers the heroes of the computer revolution, Steven levy traces the root of hacking to MIT in the late 1950s, where students devoted much time and effort to building and programming MIT’s early mainframes. These programmers, who later became known as “Hackers” produced and debugged computer code at an astonishing rate.

They developed hardware and software for existing computer functions and invented novel applications and algorithms that were later incorporated into subsequent generations of computers. The code written by hackers came to symbolize their freedom and their love for programming, which was distributed freely across bulletin board systems(BBS) and cross the unconquered terrain of the internet. Eventually, this freedom of code gave rise to the concept that software should be free.

Another argument supported by the hacker ethic s that break-ins elucidate security problems to those who can do something about them. Hacker instructions into systems surpass the traditional systems surpass the traditional understanding of violating the laws of trespassing. Hacking involves the exploitation, or as discussed by members of the computer hacker underground, the manipulation of a bug, or a backdoor that is inherently present within the system. Emmanuel Goldstein, editor of 2600, a magazine recognized as the "Hacker's quarterly," states, "Hackers have become scapegoats. We discover the gaping holes in the system and then get blamed for the flaws". This statement suggests that cracking down on hacking activity is simply a way of putting blame on the messenger. In this view, hacking is not a threat against the integrity of the system being exploited, but instead is a means of implementing corrections and enforcing tighter security.

The ethical stand supporting hacker activities are proven by this discussion to be mainly unethical. Even though hacking undoubtedly has led to productive improvement in computers and software security, it has in effect created many disruptive problems online and offline. Hacking is an activity that introduces a method of analysis that targets and works on various components. Hacking has the potential to cause harm and to violate legitimate privacy and property rights. By ethical standards hacking does introduce crucial security fixes, but does so at the expense of violating privacy and the security of individuals. Furthermore, hacking activities lead to disruptive and dangerous problems for society, which tend to be difficult to eradicate.

Friday 17 July 2009

Group 29 Task 2: Hacking

Group 29:
Kishore Kumar Motapothula
Suresh Krishna Bandi


Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creators original purpose. People who engage in computer hacking activities are often called hackers. A hacker who breaks into systems primarily to steal is not regarded as computer expert.

A hacker within the professional world of computing is regarded as a professional computing world, a hacker can be computer and network security expert. A hacker can also be a highly skilled software programmer or a hardware modifier. Computer hacking is most common among teenagers and young adults. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an art form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem solving skills. A large number of hackers are self-taught prodigies; even some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company's security system so that they can be repaired quickly.

Wednesday 15 July 2009

Group 10 Task 2: Hacking

Group 10:
VENU SALLA
KIRANKUMAR YAMA
VISHALMURTHY PILLI
PAVANKUMAR ANUPA
BRAMHANANDASWAMY MINUMALA



DEFINITION:
HACKING: Hacker is an expression which has the specified degree of importance. A clever programmer who attempts to break in to computer systems, a person who
may be expert or any in computer programmer who having the ability to create
complex software and hardware.

DESCRIPTION:
Unlike most other computer crime areas which are clear cut in term of acts and
legalities. Computer hacking involves some of the degree of violation on the
privacy of other or damage to computer based property such as files, WebPages
or software. The impact of computer hacking varies from simply being enveloping
bothersome to illegal.

Example: Ways to minimize potential for Hacking in schools:
There are a number of ways for schools to minimize potential for hacking.

1. Schools need to clearly establish good enough use policies and explain
appropriate and inappropriate actions to both students and staff.
2. Students and staff need to instructed regarding hacking, the mentality
associated with it, the consequences of various hacking actions and possible
consequences of interacting and forming online relationships with anonymous
individuals who claim to be proficient in invading others' privacy.
3. The use of filters may be considered in reducing access to unauthorized
software serial numbers and hacking-related materials, newsgroups, chat rooms
and hacking organizations.
4. Teachers need to be aware of student activities in the computer labs and pay
special attention to things they hear in terms of hacking behavior.


Types of Hacking:

There are different types of hackers named differently according to names
given by the hackers own slang (also known as jargon). Generally hackers can be
divided in to three classes such as groups or even schools.

1. Black hat hackers.

2. Grey or brown hat hackers.

3. White hat hackers.

1. Black-hat hackers (also known as crackers) are the ones who write virus,
destroy data, and deface websites along with other illegal activity. This type
of hacker will not end up at a very good job due to a bad reputation, and
usually ends up in jail for a long period of time. This kind of hacker is not
welcome at HDNL.


2. Grey-hat hackers are borderline white/black hats. They sometimes prank
unsuspecting users and cause general mayhem. While they think this kind of
activity is harmless, they may face long periods of jail time, and rejection
from the hacker community. We do not approve of this kind of hacker at HDNL.


3. White-hat hackers are the Jedi-knights of hacking, using their knowledge for
good, and usually end up working as high-paid network administration,
programmers, and security consultants. When a software bug is found, the
white-hat community will work together to solve the problem. This kind of
hacker is the most respected in the internet community, and this type of hacker
is welcome at HDNL.

Hacker ethic principles:

The general view or principles of hacker ethic include:

1. Sharing.
2. Openness.
3. Decentralization.
4. Free access to computers.
5. World Improvement.

Hacking examples:
1. New York Times: pornographic material together with this message placed on
their web server

2. Raphael Gray, teenage hacker from Wales
– Broke into several online stores
– Stole thousands of credit card numbers
– Alleged to have: Published the numbers on the Internet
- Despatched a shipment of Viagra to Bill Gates using one of the stolen
card numbers.


Issues:
A number of issues arise in considering hacking from the educator perspective.
First, we need to consider the fact that the public perception of hackers is
mixed, and that "hacking" and "being considered a hacker" can be quite
appealing to students who are going through developmental periods in which they
are defining themselves, as well as challenging authority and rules. There is
often a 'Robin Hood' mentality to early actions, though it is unclear exactly who
"the poor" are, and how they are "being compensated". Second, the anonymity of
actions which hackers perform against others often enhances the severity of
actions. For example, an adolescent who would never consider picking someone's
pocket or physically damaging someone else's property or home, might be quite
willing to steal people's credit card numbers or destroy poorly protected
business or government files, since files and credit card numbers are not
tangible entities, and the damage is done anonymously.

Sunday 12 July 2009

Task 3: Downloading Music

In your groups discuss and reflect on the Ethical issues surounding 'Storing Copyrighted Music' - see the scenario below...


The Issue

Do you store copyrighted music on your PC or work’s server? Do you 'share' music files using your work’s facilities? If you do, then, watch out! Your work could be in some real legal hot water! Plenty of unwanted negative publicity too!

People and File Sharing
We all like music. Retail music is a multi-billion pound/dollar industry. Do you think for a minute that a recording company is going to give its product away? Not likely. Yet that's the essence of the music file sharing craze. People can download their favorite songs from thousands of sites on the Web. Are the copies which they are downloading stolen? Most people don't care.

Task discussion...What are your thoughts on downloading music?
What are the illegal implications connected with doing so?
What ethical issues arise from doing this?

Group 8 Task 2: Hacking

Group 8Kapil Giri
Naveen Reddy
Gurumurthy Batharaju
Muninder Adavelly
Vishnu Chitta
Mohammad Hussain


Hacking is defined in various ways associated with Information Technology.
1. Hacking is an act of access to the computer and network with out the endorsement supposed to be seeked.
2. Always there is a human tendency of learning new things, as part of this a person tries to gain the hidden knowledge without authorisation.

The person who performs the act of hacking is called a ‘Hacker’. The methods hackers use to attack your machine or network are fairly simple. A hacker scans for vulnerable systems by using a demon dialer (which will redial a number repeatedly until a connection is made) or a wardialer (an application that uses a modem to dial thousands of random phone numbers to find another modem connected to a computer).

Another approach used to target computers with persistent connections, such as DSL or cable connections, employs a scanner program that sequentially "pings" IP addresses of networked systems to see if the system is up and running. Where can a hacker find such tools? On the Internet, of course. Sites containing dozens of free, relatively easy-to-use hacking tools available for download are easy to find on the Net. While understanding how these tools work is not always easy, many files include home grown documentation written in hacker shoptalk.

Among the programs available are scanning utilities that reveal the vulnerabilities on a computer or network and sniffing programs that let hackers spy on data passing between machines.

Hackers also use the Net to share lists of vulnerable IP addresses--the unique location of Internet-connected computers with unpatched security holes. Addresses of computers that have already been loaded with a Trojan horse are available for anyone to exploit (in many cases without the owner of the computer knowing).
Once the hacker finds a machine, he uses a hacker tool such as Whisker to identify in less than a second what operating system the machine is using and whether any unpatched holes exist in it. Whisker, one of a handful of legitimate tools used by system administrators to test the security of their systems, also provides a list of exploits the hacker can use to take advantage of these holes.

It is true that Hacking is a great skill with lot of knowledge and commitment put behind it. Ethically if it is used for a good cause with possible acceptances, it can be useful for the future for new innovations and prevent possible vulnerabilities.

Group 18 Task 2: Hacking

GROUP 18
MANI KIRAN CHOWDARY KATRAGADDA
KOTESWARA RAO UMMANENI
PRAMOD BELLAMKONDA
VENKATA SATISH ANNE
RAVICHANDRA PERNA


OVERVIEW
An invasion can be defined as an attempt to break into or misuse a computer system. The word "misuse" is broad, and can mean something as severe as stealing confidential data, or something as minor as misusing your email system for spam. Today, both the Internet and corporate intranets are simply creeping with people from all walks of life who are continuously trying to test the security of various systems and networks. In any event, no intrusion is innocent and no intrusion is benign. There is no barrier or bridge available out there that will totally protect our networks and systems. The only thing we can do as IT professionals is to make sure that all of the possible means were blocked, that the alarm is turned on. The primary focus is to train IT professionals or the end-users who is exactly being affected by hackers by establishing security guideline. And the need has been extended even to a great extent for not only to IT users as well as to uneducated users also.

WHAT IS A HACKER
The word hacker is used in popular media to express somebody who attempts to break into computer systems. A person who practices hacking is called a hacker. Normally, this type of hacker would be an expert programmer or engineer with sufficient technical knowledge to understand the weak points in a security system. And also someone who is really good at what he does with computers is called a hacker. A hack, in software circles, is a quickly written short piece of code that makes something work. It may not be stunning to look at, but it make things function. Hacking can be just to find out how it works without criminal intent. Hacking can be simply to crack a code, a hacker can be breaking into a computer that's yours or often not wanted. Originally Hacking had nothing to do with breaking into one another's computers. It was primarily tinkering away with hardware to make things work. And this damage of hackers is silent expose around in very big amount.

HACKER ETHICS
The original Hacker Ethic was sort of an impromptu, informal ethical code developed by the original hackers of MIT and Stanford (SAIL) in the 50s and 60s. These "hackers" were the first generation of programmers, employing time-sharing terminal access to 'dumb' mainframes, and they often confronted various sorts of bureaucratic interference that prevented them from exploring fully how technological systems worked. The ethic reflects their resistance to these obstacles, and their ideology of the libratory power of technology. Violating some ethical codes can get you banned from the profession or worse, when professional associations exist to enforce the regulations; with hackers, breaking the Hacker.

CONCLUSION

We have seen many new issues that come across day to day life quite often. The only means that an IT professional can improve security by increasing means of security constraints on a daily basis. However, all the hard work and money spent on the best security tools available doesn’t do any good if users don’t do minimal things such as securing passwords and locking down workstations when they leave at night. It is therefore our responsibility as IT security professionals to educate these users to the best of our ability, thus ensuring that IT security is being used even when nobody is watching. Hopefully, this paper will make less educated users think about everything they do, and impress upon them the need to consider security in their everyday practices.

Group 5 Task 2: Hacking

Group 5 members:
Akinloye Temitope .A
Abubakar Musa Shinkafi
Oni Adeboye .A
Satish Kumar Kakollu
Udaykiran Ashokpao Phulapi


White hacking is defined as hacking that identifies a security weakness in a computer or networks but instead of taking malicious advantage of it, exposes the weakness the way that will allow system owners to fix the breach before it can be taken advantage by others. ‘White hackers’ are also known as ethical hackers, such people are employed by companies where sometimes these professionals are called “sneakers”, group of theses are often called tiger teams or red teams. The ethical hackers use a variety of methods to carry out their test including social engineering tactics, use of hacking tools, and attempts to evade security to gain entry in to secured areas.

White hacking is a hobby for some, others provide their services for fee, and some of them work as consultants, interestingly white hackers are former black hackers but that is where the problem with white hacking is because hackers and hacker group fight, they insult each other in public, additionally it was claimed that some of them proclaimed being a white hackers but they end up participating in unethical behaviour perhaps the lower key crime of using a calling card for fee calls through refraining the more serious crime of credit card.


The grey hacking is combination of both white and black hacking in this there will be two set of hackers one of them are un trusted external hackers and the other are trusted internal hackers who will help the external hackers .the outside attacker will try to create a black box and the insider will provide the important information to the outsider.


Black hat hackers or crackers are those that use their skills and knowledge in programming and computer networking to break into computer systems illegally and either cause damage or steal sensitive information. Black hat hackers find fun in developing viruses to infect and cause damage to so many people for the sake of it. There are a couple of interesting hacking cases that have occurred over the few years. One of the most popular cases in hacking history is that of Jonathan James who hacked into high profile organisations such as NASA and an agency of the Department of Defence at the age of 16. He was sentenced by the law. He was released 6months later and he now plans to start his own computer security outfit.

Group 11 Task 2: Hacking

Group 11
HARSHA DONTHI REDDY
SANDEEP DUDIPALA
PAVAN NYALAM
RAHUL RAO


A Hacker is a skilled computer user. The term originally denoted a skilled programmer particularly on skilled in machine code and with a good knowledge of the machine and its operating system. It is a fact that a good programmer could always hack an unsatisfactory system around until it worked.

Now we will see about computer hackers. Computer hackers are those people who gain remote access and those files which are stored in another computer or even in operating system of a computer. In late 1950’s and 1960’s hackers are motivated more by a desire to learn the operating characteristics of a computer than by any malicious intent. Not only that in those days hackers where often legitimate computer programmers who were seeking ways of routing information more quickly through operating systems in computers. From that time onwards computer hackers have become much more sophisticated. Organized and in many cases they were illegal. But some hackers are motivated by a desire to cripple sensitive sites, make mischief and to acquire restricted information.

Few years before means in mid 1990’s several computer hackers have attempted to gain access to files in computer network. The incidents which are happen at that time are dubbed to solar sunrise were regarded as a dress rehearsal and later on some more incidents happen that is cyber attack and also in military’s computer defences.

For example we all are using yahoo messenger in our system for that we have software using that software we can hack there passwords and we can use their ID. Not only that most of the people are doing online shopping through internet for that they are using credit cards but hackers can hack those credit card and they can use those cards.

We all know that the terrorist attacks on September 11, 2001 in US. US Government enacted the cyber security enhancement act in July 2002 as part of the terrorist attacks on world trade centre in 2001. Under this legislation hackers can be regarded as terrorist and can be imprisoned for up to 20 years. One tool that is computer hacker can use to compromise an individual computer or a computer network is a virus. Depending on their design and intent the consequence of a virus can range from the defacing of a website to the disabling of a computer network. Few years before in 1990’s the number of known computer viruses increased in over 30,000.

Despite the threat that they can pose, computer hackers can also be a handy. By exposing the flows in a computer networks, hackers can aid in the redesign of the system to make information more inaccessible to unauthorised access.

Monday 6 July 2009

Group 3 Task 2: Hacking

Group 3
Bhaskar Satti
Kumar Vadlamudi
Raghu Rama Raju Kalidindi
Venkatapathi Raju Cherukuwada
Srikanth Dumpala


The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music - actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them ‘hackers’ too - and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker’.

Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy these programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

Since a large number of hackers are self-taught prodigies, some organisations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent Identity Theft and other serious computer-related crimes.

Computer hacking can also lead to other constructive technological developments, since many of the skills developed from hacking apply to more mainstream pursuits. For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX operating system in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like operating system. Shawn Fanning, the creator of Napster, is another hacker well known for his accomplishments outside of computer hacking.

In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.” This type of computer hacking can earn you a trip to a federal prison for up to 20 years.
If you are interested in protecting your home computer against malicious hackers, investing in a good firewall is highly recommended. It’s also a good idea to check your software programs for updates on a regular basis. For example, Microsoft offers a number of free security patches for its Internet Explorer browser.

Different hacking Techniques:
Hacking is obtaining illegal access to information on your computer, or another persons computer. Password cracking, spoofing, and sniffing are the main techniques that hackers use. A typical network hacking could involve all three methods simultaneously. For example:
- A hacker could first trick a user to visit the hacker's site and enter some personal data in it. This is called spoofing.
- While the user is entering the information, the hacker could sniff the network traffic emerging from the user's computer and obtain a list of passwords and logins. This is called sniffing.
- If the passwords are encrypted, the hacker could use a password-cracking tool to decrypt them.

There are other types of hacking techniques:
1) Buffer over flow hacking
2) Brute force hacking
3) TCP hacking
4) Black hat hacking
5) SQL injection hacking
6) Command line hacking.

The buffer overflow attack is one of the most common on the Internet. Just like the Y2K problem occurred because of the common coding mistake of using 2-digits, the buffer overflow bug is caused by a typical mistake of not double-checking input, and allowing large input (like a login name of a thousand characters) "overflow" into some other region of memory, causing a crash or a break.

One of the most common techniques used by hackers to penetrate your network, is just plain-old password guessing. This goes for external hacking attempts as well as internal hacking attempts. In this article I will discuss how hackers can use tools to perform brute force password hacking in your Terminal Server environments and what you can to prevent these kinds of attacks.

I have been reading into modifying my TCP/IP stack. I know that doing this lets you change your maximum amount of connections from 10 to 50.
Black Hat Hackers (also called "crackers"), are hackers who specialize in unauthorized penetration. They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Such penetration often involves modification and/or destruction of data, and is done without authorization and hence they should not be confused with ethical hackers.

The SQL Injection attack allows external users to read details from the database. In a well designed system this will only include data that is available to the public anyway. In a poorly designed system this may allow external users to discover other users' passwords
Not a huge hack, but I sometimes get annoyed that I have to go to maps.google.com and then enter an address, click a button, then if I want to link to the map, then I have to click a “link to this map” link, and then copy and paste. Isn’t there an easier way to do this?

In our opinion hackers are good programmers and they are having excellent computer skills. These hackers are of two types, they are good ones and bad ones. These hacking techniques can be used for good and bad ones.

Group 4 Task 2: Hacking

Group 4:
Naif Albwali
Amina Abdul-Hamid
Ghadah Khojah (GL)
Muhammad Aldossary


A hacker is a person who accesses computers (hardware or software) and network systems without permission often with the aim of exploiting existing codes and resources for personal or even commercial use and more. While there are hackers who help organisations secure their systems against future attacks and finding other security holes to patch, there are others who do it for fun and some for exploiting the hacked system to steal money or information. An example of a hacker is Jonathan James (also known as c0mrade) who downloaded $1.7 million dollars worth of software which controlled the International Space Station's life sustaining elements, and intercepted thousands of electronic messages relating to U.S. nuclear activities from the Department of Defense. He said in an interview that he was just playing around and having fun (Rawhack, 2009).

Some of these hackers may be honest people on their daily life but when they are behind their computer they become the opposite. Although confronting their victims might not be an issue, the way of committing a crime does not make it acceptable by any means. There isn’t much difference between a hacker stealing credit card information over the internet and a bank robber who goes to the bank physically and should both pay for their crime even though the former do not pose much of a physical threat. This brings up a very important point; hackers might not steal hard cash and this might reduce their feeling of guilt as was seen during the videos in class where the hacker did not show any remorse.

In conclusion, different people and different cultures have different perspectives on what constitutes a computer crime which is why the government in all countries should have strict laws that clearly define them and punish offenders accordingly so thatr they do not feel the crime they are committing is worth serving the sentence they are given .

Group 16 Task 2; Hacking

Group 16
Harish Kumar Lingannapeta
Sirish Sreekanth

"Hacking” refers to the hobby/profession of working with computers and breaking into computer systems such as defrauding banks, stealing credit cards, breaking into public and private databases to steal, modify or corrupt data and spreading viruses. These activities are widespread prior to the application via computer system.

The term Hacker has a double meaning within the field of computing. A hacker can be an expert computer programmer who creates complex software and hardware, a hacker is someone who gains unauthorized access to a computer system. Many hackers just like the challenge of breaking through a computer security system but not all hackers are harmless. It must also be said that not all hackers are bad. Government and huge companies use hackers to maintain their security systems. People normally confuse hackers with crackers. While hackers crack the code of passwords to hack into a security system, crackers crack the code of software to bypass its security mechanisms like copyright protection etc.

Hacking and cracking are two different methods, but hackers normally possess cracking skills and crackers, hackings skills. Also note that not all hackers are humans. You also get computerized hackers, but they are developed by humans of course. in our study related to hacking and hackers one of the reports states that Mississippi State University computer science student's research led to a FBI investigation that uncovered a computer hacker planning to jeopardize health and safety of patients at a Dallas, Texas, medical clinic.

Online bragging by the hacker mentioned control and escape computer systems responsible for critical infrastructure that could jeopardize lives, if compromised. The hacker bragged about breaking into the facility’s heating ventilation and air condition computer system with plans for a serious attack that could harm patients at the clinic, along with affecting medications kept at specific temperatures.

The Hacker Ethic was a new way of life, with a philosophy, an ethic and a dream. However, the elements of the Hacker Ethic were not openly debated and discussed rather they were accepted and silently agreed upon.

Hacktivism -is a policy of hacking, phreaking or creating technology to achieve a political or social goal.
Phracker - a person who combines phone phreaking with computer hacking.
On the whole hacking is not a good practice and if given a chance everybody want to be an hacker.

Group 2 Task 2: Hacking

Group 2
Venkatatatnam Taragalla
Naresh Jetti
Rajesh Chandupatla
Kavitha Sunki
Madhavi Kudapa

The ethical issues surrounding hackers and hacking

Hacking is an act of obtaining unauthorized access to a computer or network and hacker is a person who performs it.

In Hackers: Heroes of the Computer Revolution, Steven Levy traces the roots of hacking to MIT in the late 1950s, where students devoted much time and effort to building and programming MIT's early mainframes.

This act of breaking into other systems especially administrative tools can have dual motives:

1) To find out the loop holes in the present technology and develop them for better results.
2) To use those loop holes for the personal benefits.

The society perceives these hackers as real threat to privacy, security and the future of World Wide Web, because the world has seen the damage done by these hackers like Gary McKinnon who broke into almost hundred govt computers of US including military and NASA causing a damage of £375,235. There are many other hackers from all over the world who hacked credit cards, bank accounts and login details of important networks and systems. These hackers used these skills to their personal benefits.

In our opinion, hackers are clever programmers, who can find out the flaws and patches in the present network and can find out the ways which can harm one's privacy or security.

We strongly feel that these hackers are encouraged and every organization should employ their own team of hackers who should always work to find out ways to break into their own networks passing the security constraints, so that they themselves can upgrade their systems and networks and be secure from other vicious hackers.

Sunday 5 July 2009

Group 12 Task 2: Hacking

Group 12

Sai Domakuntla
Ramanjaneya Uddaraju
Santosh Kassetty
Shyam Kolla
Srilatha Attuluri
Vijaya Pathipati

Hacking is known for bringing a historical approach to the philosophy of science .
Hacking defends realism about science, entity realism albeit only on pragmatic grounds: the electron is real because human beings use it to make things happen. This form of realism encourages a realistic stance towards the entities postulated by mature sciences but skepticism towards scientific laws .

While "hack" was originally more used as a verb for "messing about" with (e.g. "I hack around with computers"), the meaning of the term has shifted over the decades since it first came into use in a computer context. As usage has spread more widely, the primary meaning of newer users of the word has shifted to one which conflicts with the original primary emphasis.

Currently, "hacker" is used in two main ways, one pejorative and one complimentary. In popular usage and in the media, it most often refers to computer intruders or criminals, with associated pejorative connotations. (For example, "An Internet 'hacker' broke through state government security systems ") In the computing community, the primary meaning is a complimentary description for a particularly brilliant programmer or technical expert. (For example, "Linus Torvalds, the creator of LINUX, is considered by some to be a genius hacker.") A large segment of the technical community insist the latter is the "correct" usage of the word.

When the term was introduced to wider society by the mainstream media in 1983, even those in the computer community referred to computer intrusion as "hacking", although not as the exclusive use of that word. In reaction to the increasing media use of the term exclusively with the criminal connotation, the computer community began to differentiate their terminology. Several alternative terms such as "Black hat" and "Cracker" were coined in an effort to distinguish between those performing criminal activities, and those whose activities were the legal ones referred to more frequently in the historical use of the term "Hack". Analogous terms such as "White hats" and "Grey hats" developed as a result. However, since network news use of the term pertained primarily to the criminal activities despite this attempt by the technical community to preserve and distinguish the original meaning, the mainstream media and general public continue to describe computer criminals with all levels of technical sophistication as "hackers" and does not generally make use of the word in any of its non-criminal connotations.

As a result of this difference, the definition is the subject of heated controversy. The wider dominance of the pejorative connotation is resented by many who object to the term being taken from their cultural jargon and used negatively, including those who have historically preferred to self-identify as hackers. Many advocate using the more recent and nuanced alternate terms when describing criminals and others who negatively take advantage of security flaws in software and hardware. Others prefer to follow common popular usage, arguing that the positive form is confusing and unlikely to become widespread in the general public. A minority still stubbornly use the term in both original senses despite the controversy, leaving context to clarify (or leave ambiguous) which meaning is intended. It is noteworthy, however, that the positive definition of hacker was widely used as the predominant form for many years before the negative definition was popularized.

"Hacker" can therefore be seen as a shibboleth, identifying those who use the technically-oriented sense (as opposed to the exclusively intrusion-oriented sense) as members of the computing community.

A possible middle ground position has been suggested, based on the observation that "hacking" describes a collection of skills which are used by hackers of both descriptions for differing reasons. The analogy is made to blacksmithing, specifically picking locks, which -aside from its being a skill with a fairly high tropism to 'classic' hacking - is a skill which can be used for good or evil. The primary weakness of this analogy is the inclusion of script kiddies in the popular usage of "hacker", despite the lack of an underlying skill and knowledge base.
We can classify hackers in many kinds here are few:
Media hackers - someone who uses media in new ways
Reality hacking - Hacking the real world, similar to computer hacking
Wetware Hackers -One who experiments with biological materials.

Saturday 4 July 2009

Group 6 Task 2: Hacking

Group 6 :
Vijay Puppala
Raviteja Dirisala
Harish Sripadi



HACKERS AND HACKING

The issue of Hackers and Hacking has been discussed in the lectures. Hacking in short can be roughly equated to Break and Enter, where a person can steal data or/and edit the data. Hacking is mainly done by computer experts.

Hacking is done for several purposes such as some people hack for technical motivation, i.e. to progress the evaluation of technology. Hacking is done for fun and financial gain as well as for the political motivation regarding the political movement they want to speak out against. Hacking has in the past lead to crashing Bank account (or) stock market, releasing private credit, debit card information. Hacking can help terrorist plans hidden in digital photographers, the personal information exposed. For example, A 42-year old System administrator hacked into 97 US military and NASA computers simply using default passwords in poor security areas looking for UFO information. In 1998 moors internet worm crashed 6000 servers. In the year 2000, 15,700 Credit, debit card numbers have been stolen through hacking from Western Union (when the database was undergoing maintenance).

Taking into the account the types of hackers there are Professional Hackers who can be termed as Black hat hackers usually Bad guys, White hat hackers are professional security experts. Script Kiddies are mainly students who do for getting free stuff, impressing their peers. The underemployed adult hackers which is large in Eastern European countries do for getting recognition in hackers community as well as they cant get employment in the field.

Hackers ethic is ‘freedom of information’. Hackers are not entirely good, nor are they just bad. Is it ethical (or) not ethical to hack into government system to point out security flaws without any harm to the system?

Hactivism is vandalism of websites intentionally which does not alert the attention of social problems. Hactivism violates people’s first amendment rights of freedom of speech.

Cyberterrorism are unlawful attacks. The examples of cyberterrorism can be like China-related conflicts, Mideast conflicts, Pakistan-India conflict over Kashmir, Bin laden WTC/Pentagon Terrorism. Cyber attacks often accompany regional and global conflicts both armed and unarmed. Cyber attacks are increasing in volume and impact. Politically inspired attacks are increasing. Use of cyberspace by terrorist is increasing.

On the whole Hackers are curious, motivated and talented people who experiment with systems. Hackers are behind the major technology innovation. Hackers learn and teach the way they communicate.

Wednesday 1 July 2009

Group 1 Task 2: Hacking

Group 1:
Rugveda Satam
Kenni Fernandez
Atish Jadhav
Krishna Bonda
Luis Remberto Canedo Arze


All about Hackers and Hacking

As it has already been discussed in the lectures, we know that the term ‘Hacking’ does not always means a criminal activity. There are various definitions associated to hacking as mentioned below:
1. Hacking is practice of modifying the computer’s software or hardware in order to
accomplish a goal outside the creator’s original purpose.
2. Cracking of code can simply be called as hacking.
3. The concept of hacking can be associated with the basic human nature of being curious.
If someone is hiding something, the basic human curiosity is to find out what’s being
hidden. This is nothing but hacking. The only point here is how you are making use of
the knowledge you have, in a good or bad manner.

The person who practises hacking is called a ‘hacker’. Many decades ago, a community of expert programmers and networking wizards who worked on micro-computers and ARPANET developed the concept of hackers. According to them the hackers are the one’s who built the Internet, UNIX system, they run the Usenet and created the World Wide Web. There is another group of people in the software industry who claim themselves to be hackers but they aren’t and they are the crakers.This group simply likes breaking into computers and phreaking into the phone system. In simple words, hackers build things while crakers break them. These can also be called as ‘white-hat hackers’ and ‘black-hat hackers’ respectively. Thanks to Hollywood, the concept of hackers is always associated to the dark side of technology (just as in Stars Wars movie, the dark side of force).Majority of computer users use the word hacker as a synonym of crime. But that’s not true. If we associated this with Hollywood the White hat hackers are the real world technology heroes who save our systems and valuable information to be stolen by the villains or the Black hat hackers.

But, what can be the motivation for being a black hat hacker? Definitely, money, glory or sometimes just simply curiosity to know other people’s information.

If we consider ethically definitely the black hat hackers are performing an unethical act, however one thing that we cannot ignore to appreciate is the vast amount of knowledge required to perform hacking. Hats off to these hackers. Really!

Sunday 21 June 2009

Sharing Assignment Material...

Please share any material that you find when doing individual and group research into the various topics concerning your assignments that you think may be useful to your colleagues.

To start you off...
Could be useful for the group assignmentBiometric Fingerprint Security System at Heathrow:
Announcement:http://www.computerweekly.com/Articles/2008/03/26/230008/baa-suspends-fingerprint-biometrics-security-system-at-heathrow-terminal.htm

Blog discussing the issues:http://www.computerweekly.com/blogs/the-data-trust-blog/2008/03/the-cost-of-privacy-biometrics.html

Discussion Two: Ethical Issues - Privacy

Food for thought...
There are many ethical issues that arise concerning Privacy. Where continuous innovation of technology is concerned there will always be 'ethical dilemmas' that arise as technological evolution focus more on functionalities rather than anticipated human behaviour and uses.

One example of such innovation is...''There are serious ethical issues in the use of biometric technology. The main issues concern the personal privacy, the conflict with one’s beliefs and values and the collection, protection and use of personal biometric data. The civil liberty organisations argue that the technology undermines the human rights for privacy and anonymity. It is intrusive and has the capability to make serious impact on personal freedom and democratic rights. The technology is prone to failure and is not fake proof as it can be spoofed''.
Source: www.bcs.org/upload/pdf/ashaikh.pdf

Should the use of biometrics be encouraged? Do you think biometrics aid in preventing crime? Source: http://www.comptechlib.com/biometric-fingerprint.htm

What are the ethical issues surrounding the use of biometric technology? Maybe 'personal' privacy issues come to the fore here where some may believe that the technology undermines the human rights for privacy and anonymity. What are your thoughts on this?

Discussion 1: AUP policies...Is there such thing as an Internet User Policy?

Hi All,
This is for discussion of IT (AUP) policies for the assignment. I have included a 'starter' question for you, feel free to add new threads!

Powerful tools require careful management, they always have. The same power and force that makes a tool so effective can, in a single moment of inattention, quickly transform the tool from an implement of construction into a device of destruction. The maxim holds true whether the subject is a contractor - grade 7 - 1/4-inch circular saw or the Internet.

The same capacities and dynamism that make the Internet such a profound business tool also render it a potentially dangerous diversion. Used improperly, the Internet can subject every organisation to harassment claims, countless hours lost productivity and innumerable security leaks and vulnerabilities.

What are your views? Please read the rest of the article and let us know what you think!!
Link:
http://news.zdnet.co.uk/security/0,1000000189,39283155,00.htm

Saturday 13 June 2009

Task 2 Reflection: Computer Crime: The ethical issues surrounding hackers and hacking

Task Two:

Working in your groups produce a short account (1 A4 page) expressing your ideas concerning computer crime relating to hackers and hacking and the ethical issues surrounding this issue.

Tuesday 9 June 2009

Task One: The Political Compass

The Political Compass
To get you started your first task is to take the test presented on the Political Compass site and get your own reading. Then post your reading and your views on the site on the module blog. The test will hopefully open up debate and interesting conversations...

My political compass result is: Economic Left/Right: 1.00 and Social Libertarian/Authoritarian: 0.67 - An engaging, stimulating and interesting site. I have learned something about myself that I was unaware of.

To take the test Click Here

Sunday 7 June 2009

Assignments...

There is one individual assignment and one group assignment for this module. The individual assignment is an essay and is worth 70% of the module grade. The group assignment is worth 30% of the module grade and requires you to develop organisational policies, and to contribute to the discussion boards on the module blog. Full details will be issued as per the schedule.

Saturday 6 June 2009

PIIT Module Description...

Aims of Module: It is imperative that computing/IS professionals have an understanding of the societal, professional, ethical and legal issues arising from the use and development of technology. The aim of this module is to relate the theoretical and practical work of the other modules to the work of the computing/information systems professional by introducing students to the concepts of computer ethics, professional responsibilities and IT law. This module will be an interactive learning experience with lively debates and discussions of current and topical events.

Syllabus Outline: Introduction to the concepts of computer ethics and professional responsibility; Skills for Ethical Analysis; Main ethical models; Relativism, Utilitarianism; Deontological theories; Requirements for Professional Ethics; Is computing a profession?; Models of professional relationships; Codes of Ethics (ACM, BCS, IFIP); Legal issues; Computer Crime; Intellectual Property; Law and the Internet; Data Protection; Hacking and Viruses; History of Hacking; Hacker Ethics; Legislation and legal cases; Privacy: Why is privacy important?; Computer Surveillance; Problems with Networked Communication; Privacy Legislation; Summary of Ethical and Professional Issues; Summary of required skills; Summary of Legislation and legislative Problems.
The full module specification is available on Blackboard VLE.