Ethical Hacking- an Introduction

by : ankit



The explosive growth and advancement of the Internet has brought many good things and services: Electronic commerce, easy access to vast stores of reference material and information, collaborative computing, e-mail, and new avenues for advertising and information distribution, online gaming, socializing sites to name a few. As with most technological advances, there is also a dark(Negative) side also: criminal hackers and Hacking. Governments, companies, and private citizens around the world are anxious to be a part of this revolution for the purpose of evolution and development, but they are afraid that some hacker will break(creep) into their Web server and replace their logo with pornography or some undesired stuff and all, read their e-mail, steal their credit card number from an on-line shopping and money transferring site, or implant software that will secretly transmit their organization's secrets to the open Internet (spyware etc). With these concerns and others, the ethical hacker can help with the same problem. This paper describes ethical hackers: their skills, their attitudes, and how they go about helping their customers find and plug up security holes and back doors and loose points. The ethical hacking process is explained, along with many of the problems(threats) that the Global Security Analysis Lab has seen during its early years of ethical hacking for IBM clients.

The term "HACKER" has a dual usage and meaning in the computer industry today. Originally, the term was defined as:

HACKER noun :-
1. A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary.

2. One who programs enthusiastically or who enjoys programming rather than just theorizing or mugging up the programming. These persons are the amateurs of programming who do it for self satisfaction and enjoyment rather than any professional means.

Read full and more articles on:-
http://impcompfacts.blogspot.com/2008/04/ethical-hacking-introduction.html
http://impcompfacts.blogspot.com