10 GENERAL MEDIA TECHNIQUE

in #hack6 years ago

SO THIS INFORMATION AS EDUCATION FOR YOUR BUYING KNOW ABOUT HACKING, YOU CAN HEAR THE HEART IN USING YOUR PERSONAL DATA

upload 2.jpg

WHAT'S YOU WITH HACKING?
Hacking is a technique of accessing a system by utilizing the weakness of the system is usually to steal data such as credit card numbers, email content, and other personal data. Utilizing the weakness of a system as a base idea in doing hacking. Here are 10 common hacking techniques that come from human weakness.

1.) DOS / DDOS ATTACK (Denial of Service) is a technique to incapacitate a web site by sending as much traffic as a booth net. So that the website can no longer handle the web. So BOOOMMMM. It usually infects a collection of connected systems on a network. By sending malware to the network.

2.) KEY LOGGINGis how to hack by installing spy ware into the system and spy ware will record all activities on your keyboard. Key logging is like putting carbon paper on white paper. So everything written on white paper will be recorded on carbon paper.

3.) PHISING is a hacking hack technique to create an identity by creating a fake website similar to the original website. So meaning users to provide personal data to the fake website.

4.) MALWARE is a hacking technique that includes such as spy ware hard ware virus.

5.) FAKE WAP is a hacker technique to create a fake wireless protocol and connect with public wireless protocol.

6.) EAVESDROPPING is a passive attack hacking technique. This hacker technique just go into the system continue nguping what data aja existing. This application is just aja nguping not dangerous.

7.) WATERHOLE ATTACK is a hacking technique by entering virus into the public network so that all affected by the poison. In the world of hacking usually recognize where the target is usually dijaringan where often gathered.

8.) CLICK JACKING is a technique by inserting spy ware into the available network when clicking it will get infected and all personal data is known.

9.) BAIT AND SWITCH is a technique to create a free application in which there is malware

10.) COOKIE THEFT is a hacking technique to retrieve personal data with special applications, so all your data is recorded in a cookie. And will be misused by theft cookies.

Sort:  

Coins mentioned in post:

CoinPrice (USD)📈 24h📉 7d
CANCanYaCoin0.339$17.02%-6.8%
DATAStreamr DATAcoin0.072$5.49%-3.98%
DTADATA0.009$20.47%-2.9%
KEYSelfkey0.009$7.31%-9.98%

Congratulations @almuzammil! You have received a personal award!

1 Year on Steemit
Click on the badge to view your Board of Honor.

Do not miss the last post from @steemitboard:
SteemitBoard World Cup Contest - Quarter Finals - Day 2


Participate in the SteemitBoard World Cup Contest!
Collect World Cup badges and win free SBD
Support the Gold Sponsors of the contest: @good-karma and @lukestokes


Do you like SteemitBoard's project? Then Vote for its witness and get one more award!

Congratulations @almuzammil! You have completed the following achievement on Steemit and have been rewarded with new badge(s) :

You got your First payout

Click on the badge to view your Board of Honor.
If you no longer want to receive notifications, reply to this comment with the word STOP

Do not miss the last post from @steemitboard:
SteemitBoard World Cup Contest - Quarter Finals - Day 2


Participate in the SteemitBoard World Cup Contest!
Collect World Cup badges and win free SBD
Support the Gold Sponsors of the contest: @good-karma and @lukestokes


Do you like SteemitBoard's project? Then Vote for its witness and get one more award!

Congratulations @almuzammil! You received a personal award!

Happy Birthday! - You are on the Steem blockchain for 2 years!

You can view your badges on your Steem Board and compare to others on the Steem Ranking

Vote for @Steemitboard as a witness to get one more award and increased upvotes!