Monday, October 11, 2010

INTRODUCTION TO HACKING

In this new era technology are getting more advance and modern day to day. The internets are well developed in many fields such as entertainment, sports, business, education, and government. Although, internet is a useful and helpful to us now a day but still it has the disadvantage using a internet. One of the biggest problem that usually internet user’s face is “Cyber Crime”. Cyber crime is a getting very serious matter and worse to the internet user. Cyber crime is a illegal activity that done in internet and this cyber crime is not allow is not allow in our country, it consider like a crime. Cyber crime is done by using a machine which is called computer and internet to steal or hack a person’s data or property.
There are many types of cyber crime that the internet user faced, but in e-commerce there are six types of main or major cyber crime are involved. Hacking data is one of the biggest cyber crimes that the computer and internet user faced. “Hacking” is a word that originally comes from “hack”. Nowadays hackers are commonly called as “cracker” which means a person who performs some form of computer damage. Hacking data is stealing someone’s information or private data without showing our identity by using a computer and internet. Hacking also a simple way to look things such as, the hacker can view hidden code on page or can allow someone to access a password protected situation. The second cyber crime that the internet user faced is phishing, means when a person needs to send out an e-mail to someone who asking to send personal information, such as a credit card number and social security numbers or it’s like any private pin number that is secret. After that, in the e-mail they will claim as representing your bank or any financial institution and they will ask us to send any information via e-mail to them so it will have like a link to “spoofed” web site which looks almost the same like our financial institution. The identity or the individual will save all the information that we give into a database where the individual can use our credit card number to purchase items on internet.
Credit card forgery is the most common cyber crimes that happen to most of the credit card users. The credit card is used one month to buy any items then end of the month the customer need to pay the full balance. Credit card forgery happen went a card is stolen and the customer received a payment bill without buying any item so it means do not sanctioned duplication has made. Most credit card issuers will refund back all the charges they did not buy. And there is “soft fraud” is a fraud that committed by the costumer their self. With no intention ever to pay the balance these individual customers are called “diabolical”. Spam is another part of doing cyber crime in e-commerce it is one of electronic messaging system which has been misused to indiscriminately send unwanted bulk messages. The popular or knowable form of spam is e-mail spam. The is some similar abuses term that applied in other media such as instant messaging spam, use net new group spam, web search egine spam, spam in blogs, wiki spam, mobile spam, and junk fax transmissions. Spam is economically viable because advertisers has no operation cost beyond the management of their mailing list and it couldn’t stop the senders accountable for their mass mailings. There are some consequence such as lost productivity and fraud are borne by the public and ISP (Internet Service Providers). It also has been force to add extra capacity to cope with the deluge.
Now a day the pornography cyber crime or “porn” is one the biggest cyber crime that are getting increase among the new generation and the youngster, it’s because it is the explicit depiction of sexual subject matter, especially with the sole intention of sexual exciting. Over the past few decades, an immense industry for the production and consumption of pornography has grown to emergence of the VCR, the DVD and internet. The person or the performers’ in pornography know as pornographic actor or actresses or more popular non as “ porn star”. In this era pornography is used in variety of media printed such as literature, photos, drawing, painting, sound recording, film, video, or video games. Went ever sexual act are performed for a live audience of public, it is know as sex show a striptease maybe can considered similar but not identical to pornography. Pornographic magazines are technically illegal.
Indian publications are available through many news vendors, who often stock them at the bottom of a stack of non-pornographic magazines, and make them available on request. In practice, the police usually ignore this as long as the display itself does not contain nudity. Most non-Indian publications (including Playboy) are usually harder to find, whether soft core or hardcode pornographic magazines to India from a country where they are legal is also illegal in India. In practice, the magazines are almost always confiscated by  and entered as evidence of law-breaking, which then undergoes detailed scrutiny. But the enforcement is very lax and hardcore pornographic films are easily available in the smallest of towns and villages.
The final cyber crime is have been done in international level and there is some train of thought that says cyber terrorism does not really exist, and the real matter is hacking or information warfare. Some really disagree with labeling it terrorism proper, its unlikelihood of the crecition of fear of significant physical harm or death in a population using electronic. Cyber terrorism can have a serious large-scale influence on significant numbers of people, and the numerous are unpredictable. It can weaken the countries economy greatly, thereby stripping it of from its resources and making it more vulnerable to the military attack. Cyber terror can also affect the internet – based business, like the brick and mortar retailers and service providers. Most of the websites that produce income could stand to lose their money in the event of downtime created by cyber criminals.

           

No comments:

Post a Comment