Friday, October 2, 2009

Is Hacking legal?

HACKING AWARENESS



Hacking nowadays are more skillful, they uses several types of intrusion from a system. Some puts virus in order to destroy the system some are getting bypass by the use of codes and algorithms.
Now talking about hacking the people behind that are what we called hackers. Now in hacker there are two types of them base on my research. Well, there is a hacker, and an ethical hacker.



An ethical hacker is hired by a company to try to hack into the company's.. company.. haha. they are paid to find out their flaws, and how to secure.
A hacker is someone who just does it for the hell of it, or to gain information.


You Are allowed to hack your network, if it is yours, but you aren't allowed to hack anybody else's network, THAT is illegal, unless you have permission.

Hacking is a widely-misconstrued term.

It's the act of achieving a goal with something by using it in a non-traditional way... basically, using it as a tool that it wasn't designed for.


How to stop hacker theft: Employee awareness, risk assessment policies













Think for a moment about the possibility of your company's infrastructure being in the crosshairs of a serious malicious hacker. How valuable would information about your infrastructure be? Do you really know how much sensitive information is publicly accessible or easily obtainable with a little creativity? How can you stop hacker theft of this information?

The first step in any serious hacker's attack is reconnaissance on a target. Let's look at a few of the more common techniques and learn how to stop hacker theft.

Often there will be a surprising amount of sensitive information about your company sitting on the Web, waiting for someone to stumble upon it. Have you ever searched IT forums for your domain name? Try it! All too often, technical employees will post questions or answers to public forums, mentioning specific equipment in use at the company, and they'll use their work email address! Ouch! Obviously, they aren't thinking about the "black hat" who would love to find out what type of firewall or server you own without having to touch your network.

To avoid this scenario, enforce an employee awareness training program and risk assessment policies that require enterprise users to use a non-work email address to post any information to a public forum. Make sure employees know that the company's name should never be used in such postings. They'll still get their questions answered, but your infrastructure details won't be posted for the world to see.