How to Hacker?steemCreated with Sketch.

in #steem7 years ago

Hackers are hacked for computer piracy purposes such as by damaging their computer systems, decoding their personal information by accessing other people's computers through computer software. How is it hacker in 2017? The issue of why people want to hurt other computer users' systems or specific information is an explanation. But we can give a few small threads to answer the question of how hackers are curious. Although smaller hackers may be less likely to be a good hacker for at least 4 or 5 years of work and serious training.
Before answering this question, one must state that those who dream of becoming a hacker in American movies must first give up their dreams. Because virtual attacks on movies are not really possible in the real world. The first thing we can recommend to computer users who want to be a hacker is that they are curious about computer systems. Theoretically, it is very difficult for people who do not understand computer systems and software at least a moderate degree in practice. Hacking attacks are primarily accomplished through a complete discovery. A hacker who wants to attack any system must first recognize the system it intends to attack first. A successful hacker does not consider a hacking system that he has never been aware of, or a system that is likely to be captured. Today, IP addresses can instantly identify the identity of novice hackers and can seriously flaunt their heads.

The most common type of hack for people who think of being a hacker is how the hacker is called the type of attack called virtual armies using the small flooders called botnet. Bottoms access the computers they access, with a simple command from Hacker, which attacks the system and organizes attacks called DDoss, http, Syn, and attack. The purpose of this hack is to capture important information in that system rather than harming the counter-computer.

The hacker's most common type of attack is that of today's botnet. The most commonly used software is the Zeus botnet software. The feature of this software is that it can not be detected by antivirus.

What is Botnet?

For those who want to be a hacker, we need to provide information about the botnet. The most dangerous of Botnet is the type of flood attack called SYN. Because SYN sends a Synchronize package that hosts client-related information to connect to the server. As a result of the receipt of this package by the server, it sends a narrow message to the client that information is received. With this message coming from the opposite side, the hacking attack begins. The SYN packages attacking the opposite server and turning off this attack into bulk within 10 minutes, causing it to become destructive and disrupt the site's system crashing.

Not only does it have the experience of becoming a Hacker with just one example, but for the people who are interested in it, there may be a sample of light above.

Coin Marketplace

STEEM 0.25
TRX 0.19
JST 0.037
BTC 91222.76
ETH 3323.12
USDT 1.00
SBD 3.88