Thursday, 10 April 2014

Top Ten Hacker Tools

Hacker tools are programs written to access a computer system using known software vulnerability. Most of these programs have been written and are freely distributed from "Hacker" websites. Some of these programs were written for legitimate uses and are abused as a hacking tool.

  •  Access Diver
  •  LANguard Network Scanner
  • Cracking Tool
  •  IOpus Password Recovery XP
  • Key Generator
  • Personal Antispy
  • XPKey
  • Super Scan 3.0
  • LastBit Password Tools 4.0.0.3175
  • Aet_network_scanner10

What is red- and white-hat hacking?

I'm not sure what you mean by "red-hat" hacking, unless it refers to some kind of Linux hacking. The "hat" colors in hacking have evolved as hackers try to differentiate themselves and separate the good hacker from the bad.
"White Hat" usually refers to hackers who don't break the law, commit any offense or engage in any malicious activity as part of their hacking. The term is now commonly used by security consultants who offer hacking/penetration testing as part of their services.
"Black Hat" is the term that white-hat hackers and commentators often use to define malicious hackers who cause harm or break laws as part of their hacking exploits. The term "cracker" is also used to describe black-hat hackers. But, most black-hat hackers don't usually care what you call them, just as long as it's not "script kiddies."
"Grey Hat" is the term often given to hackers whose actions are not malicious but whose hacking methods may cross legal or ethical lines. It's also used to categorize hackers who may at one stage have broken the law in their hacking activities, but who have since come across to the more ethical white side.
As the security industry grows and new categories of hackers emerge, perhaps Red Hats will denote aggressive hackers, and Green Hats will only be worn by Irish hackers!

Seeking an ethical hacking career: How to learn ethical hacking

The field of ethical hacking is increasingly popular, and I'd like to know more about what it actually is. Can you tell me what an ethical hacker does, what skills he or she needs, and what it means (generally speaking) throughout the industry to be an "ethical" hacker, as opposed to unethical?

What is “out” in System.out.println()?

We now know that ‘out’ is a variable, so we must now ask ourselves what kind of variable is it? There are two possibilities – it could be a static or an instance variable. Because ‘out’ is being called with the ‘System’ class name itself, and not an instance of a class (an object), then we know that ‘out’ must be a static variable, since only static variables can be called with just the class name itself. So now we know that ‘out’ is a static member variable belonging to the System class.



In Java, how does System.out.println() work?

This question is an excellent example of how just some very basic knowledge of Java can lead you to the correct answer. Most interviewers would not expect you to know the answer to do this right away – but would like to see how you think and arrive at an answer.
Marcus Aurelius (a Roman emperor) once said: "Of each particular thing ask: what is it in itself? What is its nature?". This problem is an excellent example of how that sort of thinking can help one arrive at an answer with only some basic Java knowledge.
With that in mind, let’s break this down, starting with the dot operator. In Java, the dot operator can only be used to call methods and variables so we know that ‘out’ must be either a method or a variable. Now, how do we categorize ‘out’? Well, ‘out’ could not possibly be a method because of the fact that there are no parentheses – the ‘( )’ – after ‘out’, which means that out is clearly not a method that is being invoked. And, ‘out’ does not accept any arguments because only methods accept arguments – you will never see something like “System.out(2,3).println”. This means ‘out’ must be a variable.