Ethical Hacking Attack in white house America
Recent US president to the White House computer network was hacked. So that hacking is natural to question how much can be dangerous and how it can be avoided?
How to know about Hacking
Computer / Mobile has been hacked, it's just like the - } What new program installed on your computer are you? } What systems, mobile or e-mail you have changed your password? } Just slow internet connection is running on your system? } Computer's antivirus program automatically uninstalled? } On your e-mail spam mails are coming in large numbers consistently? } What are inadvertently Progams seeking permission to run on the system? } What have you changed your browser homepage?Who will do hacking
Hackers are experts such computer by holding any software or network weaknesses that put a dent in it. Hackers from the amateur computer experts are educated by IT experts. Hakarssirf to demonstrate some knowledge of technology to do so, for your hobby.लेकिन सबसे खतरनाक वे हैकर्स हैं जो वेबसाइट्स, कम्प्यूटरों और मोबाइलों को क्रैश कर देते हैं या फिर गुप्त जानकारियां और पासवर्ड्स चुराकर उन लोगों को बेच देते हैं जो इसका दुरुपयोग कर सकते हैं। Some hackers are hacking for other economic benefits.
How hacking harmful?
} Common man
Being a victim of hacking your mobile, computer, e-mail the required documents and personal photos afraid of being stolen.(जैसे हाल ही में कुछ सेलेब्रिटीज और आम लोगों की न्यूड तस्वीरें सार्वजनिक हो गई थीं।) इसके अलावा बैंक अकाउंट या क्रेडिट कार्ड की जानकारी चोरी होने पर आर्थिक नुकसान होता है। Identity theft (ID theft) is also through hacking, the hackers do illegal deeds in your name.
} CompaniesHackers a company's customer information (phone numbers, etc.) and business or new project data stolen and sold to the rival company. It is the first company to reach a huge monetary loss, decrease the credibility of the company. Sony, Citigroup and international companies such as AT & T to lose and have been a victim of hacking.
} GovernmentAll the countries of the world have suffered the brunt of hacking from time to time. Some time ago Akvebsait of India was hacked by Pakistani hackers. Goa government's 15 sites have been hacked. Considered the most powerful country, the US White House, the Pentagon and NASA websites have been targeted by hackers. The loss comes across as a threat to the nation's security system.
ethical Hackers
To prevent illegal hacking hackers Ethical hackers who call to seek help. These companies and governments hires so they can test their websites to make them hacking proof. Staying in the realm of the law to hack websites to see all the ways how the site needs protection.
Hacking War in 2014
If the White House hack the network is suspect Russian hackers. Many countries are accused China of hacking. India-Pakistan hackers are targeting each other's websites.माना जा रहा है कि आने वाले समय में देशों की बीच अगर युद्ध होंगे तो वे भी ऑनलाइन ही होंगे। Hackers and security mechanisms associated with the military forces of other nations can harm intelligence is stolen. Given the seriousness of the National Cyber Security Policy last year, the Indian government has had to make. Other countries are working extensively on cyber security.
Where is the threat of Hacking?
} MobileSteal data from mobile Hakarska new buzzword. Hackers take advantage of smartphone Internet connection. Cheap Chinese mobiles hacking is even easier, since it already contains such software which help in hacking. Cloud service ie online drive these days (Google Drive, Forest Drive, etc.) but also increased the trend of the data is to be saved. Even hackers are stealing your private data.
> How to Avoid: Do not buy cheap Chinese mobile. Do not save your personal photos and important documents in Mobile. If you will draw a picture to upload to the cloud rather than external drive (pen-drive or CD, etc.) and keep safe. } Computerअगर आपका कम्प्यूटर किसी नेटवर्क से जुड़ा है या फिर उस पर इंटरनेट या वाईफाई कनेक्शन है तो आपके डाटा के चोरी होने की आशंका बनी रहती है। By doing so, your e-mail, documents and information relating to the theft of the family is possible, which can be used for identity Theftjase crimes. > How to Avoid: Do not place the computer sensitive information. Pen drive by making a backup of personal information, etc. Keep in CD. Keep your Braujrski clear history from time to time. Do not save passwords on the computer and they keep changing from time to time. Keep always on option in computer firewalls.
} BankingOnline banking and credit card hack hackers are able to transfer your money into other accounts. For illegal transactions with your bank account or credit card also can be used so you can have enormous economic losses.
> How to avoid: your banking passwords, computer / mobile Do not save and keep changing it. To login, use the virtual keyboard on banking sites.