Saturday, 14 June 2014

Ethical Hacking

The book I read to research this post was Ethical Hacking Secrets Guide by Govind Parihar which is a very good book which I bought from kindle. This book is a kind of manual to an educational course in ethical hacking that takes you through it step by step. It's ideal for people new to the subject and is fairly easy to follow. Govind teaches a course in this subject. There is good advice for people trying to secure their computers against attack like using specialist dictionaries like star wars ones to come up with secure but memorable passwords. The book is primarily for pen testers who are paid to try and hack a computer network and tests its secureness. It tells you all about your options regarding tools. One of the best is lophtcrack which looks for clues to try and enable you to crack the password. It tells you all about the legal aspects and how someone can't be prosecuted for a hacking crime unless they can prove that person knew he was trespassing on a network he wasn't supposed to. Some hackers say they are doing it for educational means but it causes a lot of trouble for the system administrator who can only assume the hacker is malevolent. The book is a decent length but the writing on each page tends to be quite brief. I did really enjoy reading this book which helps make a difficult subject readable. Some hackers cause damage by using low level languages like python and C to create huge files to flood a network called a denial of service attack. Higher level languages check file sizes. Most viruses are written in java and many computers use a java sandbox which limits the virus to a small area on a computer where it can't do any damage. Some viruses use active x controls which can't be limited in this way. This idea of limiting what something can do on a computer is often referred to as virtualization. This is becoming very big especially in business computing.

No comments:

Post a Comment