Century 21 and piracy
Century 21 and piracy
Hello to the blog Step of professionalism
Today's topic is piracy. Surely you heard about piracy 'and Almqrsnin especially in the 21st century and this will Nqrbakm Aktar of this bad phenomenon that can infect your day
1 The concept of electronic piracy
Electronic or informatics Piracy is the process of penetration of computers are online often; because most computers world connected through this network, or even across internal networks, which is linked to more than one computer, and does this person operation or several versed people in computer programs and their methods of operation; ie: they are people with a high level programmers can by programs to help penetrate certain computer and get to know its contents, and which are penetrating the rest of the hardware associated with it in the same network.
Date of piracy:
Piracy and penetration began with the onset of electronic calculators, and has greatly increased with the use of network technology; where the breach involves an attack on computer networks by hackers electronic systems and violators of laws, and the evolution in the confidentiality of the field shows the information that covers the Internet as well as other techniques such as telecommunications.
Piracy operations evolve and super fast by using modern and sophisticated techniques; making it look completely from what it was in previous stages change, I will try the most important cases of piracy that have occurred throughout history, which are listed as follows:
1 - in 1986 the person named Roberto Soto (Colombian nationality) of stealing government Telix line; to send group messages through it to banks in the United Kingdom, and from there to other countries, resulting in these messages transferred $ 13.5 million from the Colombian government balances.
2 - in 1988 he has a Curl University students planted Worm program in network-governmental computers which spread in 6000 computer, and after it was revealed, was expelled from the university, and was suspended by three years and fined 10,000 (ten thousand) dollars.
3 - a group of Russian hackers have transferred $ 10 million from the City Bank to bank accounts in various countries around the world in 1994, and it was the gang leader, "Vladimir Levin," used his personal computer to transfer money to accounts in both Finland and Israel, it has been stopped in The United States, and was sentenced to three years.
4 - During the 1995 hit computers Pentagon attack to 250,000, also mutilated federal sites.
5 - A group of hackers to penetrate the website of Microsoft Corp. software in 2001, and although the problem was solved within a few hours, but millions were unable to browse the site for two days.
6 - In 2007, the Turkish pirate named karem attack on the website of the United Nations Organization on the Internet.
Hackers information rating:
1 - Amateur (hackers) Hackers:
Amateur depends on the spyware ready and available everywhere, whether by purchase or download from the Internet, the hackers planted patches & Trojans spyware on a victim's computer by e-mail or gaps Windows detected by the program, this breed of hackers objectives childish; where seeks to prove its success in the use of these programs and joining the list of hackers; in order to boast among friends as someone who has the talent lacking in some of them, and they all distract them is to infiltrate the computers of others and steal their e-mail, and the manipulation of these devices settings, while leaving the states they did this as a form of vanity and ostentatious self-forms.
2 - professional (crackers) Crackers:
The professionals understand the team more dangerous; because they know what they want, and what they do, and how to reach their goals by using what they have learned Atorunh constantly, in addition to the use of advanced ready-made programs, but they rely on their expertise in programming languages and operating, design, analyze and run programs quickly, as the basic hobby figure out how to work the programs do not run.
The objectives of this team bigger and more dangerous than the former team; Vohdavhm banks and withdraw funds from the customer account, or access to the most dangerous and the most sensitive sites, manipulation or destruction of their data.
Alhecrz skills:
The hacker skills, which they can penetrate corporate sites, and penetrate the decryption password, whether private e-mail, or company site on the Internet, or decode "serial Nmbr" When you install a program.
Forms of piracy:
1 - telephone piracy:
Piracy is meant here is the phone to make phone calls without paying taxi call, and this is done using (electronic mailboxes) prevent the work equipment call calculated.
2 - Piracy local programs:
This piracy is a metaphor for the bypass software that are placed on the embezzlement without copying Applied software; ie: are not authorized.
It began to boom this kind of piracy in the eighties in Bulgaria, where the pirates are copying Western software for re-exported to other Eastern European countries, and often does these pirates themselves to the development of new computer viruses as well.
Most of the pirates in this category in Western countries are either secondary students are fond of video games, or college students, and as such dominant that they are pedophiles computer and electronic technology, and believe in the free should be the use of computer networks on the basis that it facilitates people touch operation, and documenting the social relations and friendship between nations and peoples.
The reasons why to commit piracy crimes:
Perpetrators differs piracy crimes for perpetrators of ordinary crimes, in principle, and the way to do a criminal act, but in the end both parties violators of the law remains; therefore deserve punishment, including committed crimes.
There are several reasons to pay a commission of IT crimes, can Ochtzaretha following:
1. The love of learning:
Is a love of learning and reconnaissance of the main reasons why the commission of such crimes; because a hacker is believed that computers and systems are the property of all, should not the information remains restricted to one; ie: that everyone has the right to identify and take advantage of this information.
2. physical benefit:
Attempts rapid gain may be, and reap huge profits without getting tired, not capital, of the reasons that push to break through electronic systems such as those used by banks through access to bank accounts, and manipulated, or the illegal use of credit cards.
3. entertainment and amusement:
Quite a few hackers systems take from their work this way for fun and entertainment, and spend as much time as possible in the other systems, computers, and this penetration is often peacefully, and without that happening to little effect.
4. personal motives:
Is a human surroundings and the environment in which the factors affecting lives in his behavior and his actions, and are often paid labor problems to the desire for revenge and the presence of electronic systems to facilitate him to do Brgbath, Afeebut contents to the point of sabotage, or be motivated challenge and prove the merit in front of others so that this person is proud that he can penetrate any computer or any system, no one can stand in the face.
How can hackers access to your computer?
When your computer is exposed to infection spyware file which (Patch or Trojan), it immediately opens Port (port) or port inside your computer, you can count everyone who has a spy program to break into your computer through this file, which opens like a zone secret window that enters including thieves, who are hackers!
Pirates are famous:
1 - "Vladimir Levin," Vladimir Levin:
Intelligent in mathematics, and this is one of the main reasons for the fame of his belief, he graduated from the University "Tikhnologizescaa Petersburg", was the mastermind behind a gang thief Russian computers, which lured computers "Citibank" to give $ 10 million.
2 - "Johan Helsengios" Johan Helsingius:
Known emitter create e-mail messages, the famous, and named "Bnt.vi" (Penet.fi).
3 - "Kevin David Mitnick" Kevin Mitnick:
Goodwill has a name on the network was "Condor" Condor., A teenager was unable to provide for himself his own computer, but one of the things is normal for "Mitnick" he used chat rooms on the Internet to send messages to his friends, he has been judged the first time to one year imprisonment in reform, and "Kevin" pirates immortals; where the first pirate writes his name in the regulations between the FBI's most criminals request was considered.
The most important ways to penetrate the computer:
Are most of the intrusion by planting a specific program in the victim's machine, this program a particular job, as follows:
1 - virus Virus:
Is a program that has the ability to copy itself more than once, and is characterized by its ability to stealth, and has destructive effects on computer operating systems; because the copying process and permanent repetition of its files to make these files replace the original files on the hard disk of a computer Hard Disk.
2. Trojan horses Trojans:
He espionage program, the particular action determined by the person who designed or planted in the victim's machine, you can get on the finish.
3. Worms Worms:
Is a program that is often transmitted via e-mail, and is characterized by its ability to navigate through online networks; for the purpose of disabling or disturb them by paralyzing their ability to exchange information.
4. bomb Informatics Information Bomp:
Is a program that is made by the same system is designed; for the purpose of ending the work order system during a given time period, or in the event of the use of certain numbers or characters specified by the designer.
5. trap Trappe:
He leaves port program is designed easily to him the process of entering him what he wants time, and make adjustments they want.
How to protect yourself from hackers?
1 - Use the latest security software from hackers, viruses, and make regular and comprehensive survey on your computer around the same time, especially if you are using the Internet on a daily basis.
2. Do not enter into suspicious sites, such as sites that teach spyware, and sites that fights governments, or sites that contain films and images pornographic; because hackers use the likes of these sites in introducing spyware to victims; where they are spying file inauguration (Patch) automatically in the device once you enter a person to the site!
3. do not open any email from an unknown source; because hackers use e-mail messages to send spyware to the victims.
4. not to receive any files during the (chat) from people who are not trusted, especially if these files carrying extension (exe) like (love.exe) or that the files from the animate Alamtdadan be, such as: (Ali.pif.jpg), and be the likes of these files is a grown spyware programs on your computer, through which he can count hackers access to your computer, and causing harm and problems for you.
5. Do not keep any personal information into your device, such as letters own, or photographs, or important files, and other banking information, such as account numbers, or credit cards.
6. Place the secret numbers on your important files; which can not be opened only from known only PIN, which you are.
7. tried as much as possible that you have a certain number of friends over the Internet, and be in them honesty and ethics.
8. Always try to change your password periodically, they are permeable.
9. Be sure to lift the wire connection to the Internet after the completion of the use of the Internet.
10. Do not receive any file and upload it to the hard drive in your PC that were not sure of its origin.
When it comes to our ears the word piracy, we imagine gangs steal naval vessels and robbery, and looting of what the families of the crew, which is the same as doing a pirate electronic systems exactly, but modern means, and without having to expose himself to danger.
2 Concept of hacker
The hacker generally a word that describes skilled team of specialist skills in the field of computer security and informatics. The hacker (in English: ******) Basically the word fired on a group of clever programmers who unite disparate systems and try to storm it, not necessarily to be in the intention to commit a crime or even a misdemeanor, but their success in penetration is considered a success for their abilities and skills. However, the law considered them outsiders managed to enter the default venue should not be in it. And to do this optional process in which the programmer tested his abilities without knowing his real name or declare himself. But some of them are exploited by criminal sabotage to clear information, others are commercially exploited for the purposes of espionage and to steal some money.
Here I found a lot of companies like Microsoft need to protect their systems and found that the best approach is to assign Hola Hackers high salaries of their mission to try ****** different systems and find places weaknesses and propose the necessary prevention. In this case, the image began hacker to gain a lot of pros. However, the primary one is named. **** Know the word programmer of particular capabilities used in the right and can be used in error it has become
To Atnso careful not safe in this universe
Blog Entry mohamed ejjaoui
Century 21 and piracy
Reviewed by Unknown
on
9:40 AM
Rating:
Reviewed by Unknown
on
9:40 AM
Rating:



No comments: