Showing posts with label password. Show all posts
Showing posts with label password. Show all posts
Hacker and Cracker
Hacker and Cracker
in my previous post has provided little explanation about the hackers, this time I will give you the difference between hackers and crecker

Hacker
1. Having the ability to analyze the weaknesses of a system or site. For example: if a hacker tries to test Yahoo! site confirmed the contents of the site will not be messy and disturb others. Usually hackers reported this incident to be a perfect repair.
2. Hackers have ethical as well as creative in designing a program that is useful for anyone.
3. A hacker is not stingy to share his knowledge to people who are seriously in the name of science and virtue.
While a cracker, he was able to create a program for the benefit of himself and is destructive or damaging and make a profit.
As our example: Viruses, Credit Card Theft Code Warez, Burglary Bank Account, Password Theft E-mail/Web Server. Can stand alone or in groups in action. Having a site or our channel in IRC are hidden, only certain people can access it. Having an IP that can not be traced. The most frequent case is that Carding Credit Card Theft and burglary site and change everything in it becomes a mess. For example: Yahoo! never experienced anything like this so it can not be accessed in a long time, the case of the most hotly discussed clickBCA.com 2001.
Due Brought About by Hacker and Cracker
• Hackers: making the Internet more and more advanced technology because the hacker uses his expertise in computers to view, find and fix flaws in the security system of a computer system or in a software, an administrator makes the passion to work back to life because of hackers helps administrators to strengthen their networks.
• Crackers: damage and paralyze the entire computer system, so that the network user data corrupted, lost, or changed.

Hacker
1. Having the ability to analyze the weaknesses of a system or site. For example: if a hacker tries to test Yahoo! site confirmed the contents of the site will not be messy and disturb others. Usually hackers reported this incident to be a perfect repair.
2. Hackers have ethical as well as creative in designing a program that is useful for anyone.
3. A hacker is not stingy to share his knowledge to people who are seriously in the name of science and virtue.
While a cracker, he was able to create a program for the benefit of himself and is destructive or damaging and make a profit.
As our example: Viruses, Credit Card Theft Code Warez, Burglary Bank Account, Password Theft E-mail/Web Server. Can stand alone or in groups in action. Having a site or our channel in IRC are hidden, only certain people can access it. Having an IP that can not be traced. The most frequent case is that Carding Credit Card Theft and burglary site and change everything in it becomes a mess. For example: Yahoo! never experienced anything like this so it can not be accessed in a long time, the case of the most hotly discussed clickBCA.com 2001.
Due Brought About by Hacker and Cracker
• Hackers: making the Internet more and more advanced technology because the hacker uses his expertise in computers to view, find and fix flaws in the security system of a computer system or in a software, an administrator makes the passion to work back to life because of hackers helps administrators to strengthen their networks.
• Crackers: damage and paralyze the entire computer system, so that the network user data corrupted, lost, or changed.
the entire post in my blog, actually does not aim to teach about how to hack and creck for crime, this is all aimed to increase knowledge about the world of internet and computer course
How To Hack

How To Hack
you must know what the mean by "hack", a hack is a way or trick to break into and ransacked a system and its contents forcibly. people who like and expert in the field of so-called "hacker", to become a hacker is not easy, it takes more experience and a long time to master it all.
a hacker who need reliable and skilled experts in the field of computer programming and so on, because the word "hack" parlor leaning on computer programs and so on.
a skilled hacker can get what she wants by stealing all the data and passwords are owned by the victim.
a hacker could be called "criminals" because of the things that could harm others. just imagine if we had been doing business or businesses, but all the results of our efforts dcuri by others, surely we are very disappointed and we too are lost. It is one example of things that can harm us, and also many other examples. but that all are the words of people who are less experienced.
Not all hackers that harm other people, even otherwise, he has made new things that are useful to the computer network, make a small program and share it with people on the Internet. different from the cracker, Cracker is a term for those who go into other people's systems and crackers is more destructive, usually on a computer network, bypasses passwords or licenses a computer program, knowingly against computer security, deface the (changing the web home page) property of others and even to delete the data of others, stealing data and generally do the cracking to his own advantage, malice, or for other reasons as there are challenges. Some of the piercing done to show the security weaknesses of the system.
for more details, please click here to know the difference between hackers and crecker.
you must know what the mean by "hack", a hack is a way or trick to break into and ransacked a system and its contents forcibly. people who like and expert in the field of so-called "hacker", to become a hacker is not easy, it takes more experience and a long time to master it all.
a hacker who need reliable and skilled experts in the field of computer programming and so on, because the word "hack" parlor leaning on computer programs and so on.
a skilled hacker can get what she wants by stealing all the data and passwords are owned by the victim.
a hacker could be called "criminals" because of the things that could harm others. just imagine if we had been doing business or businesses, but all the results of our efforts dcuri by others, surely we are very disappointed and we too are lost. It is one example of things that can harm us, and also many other examples. but that all are the words of people who are less experienced.
Not all hackers that harm other people, even otherwise, he has made new things that are useful to the computer network, make a small program and share it with people on the Internet. different from the cracker, Cracker is a term for those who go into other people's systems and crackers is more destructive, usually on a computer network, bypasses passwords or licenses a computer program, knowingly against computer security, deface the (changing the web home page) property of others and even to delete the data of others, stealing data and generally do the cracking to his own advantage, malice, or for other reasons as there are challenges. Some of the piercing done to show the security weaknesses of the system.
for more details, please click here to know the difference between hackers and crecker.
remember: do not misinterpret what it is hackers actually
How to Hack MS Word
How to Hack an existing MS Word document password
like the title of this blog "How To Hack", I will give some way to hack MS Word document, in fact I do not aim to teach or be a Hacker Hack, this is just an ingredient for learning only. just ok
I want to share ideas to break into MS Word document that has been fitted with a password. For this problem I use a tool that is quite popular opening password is "Passware" the original source downloaded from http://lostpassword.com. Which of course has been modified (was crack) by people who like the freedom of course.
get on with it. first, download tool here. After unpack and install it on as usual (do not forget to enter the serial number that is in cracks.txt).
Run the program, take from the start menu - Passware - Office Key. See the picture below.

Before running, do the setup first. aim to make it more effective to use. Click the Settings menu, select General on the Bruce forceAttack types (other options contengnya marks omitted) then OK.

on the choice
Then click Recover to find and open a MS Word file was password that you want at the unloading password. Wait a moment until the program will process the documents out the password (preferably one that is open programs be closed, because the program requires a large memory resource). The length of the password depends on the length unload password installed. For 4-digit password can be less than 30 seconds, to 5-6 digits can reach 2-10 menitan. For passwords that can wait even longer while sleeping alone .. he he ... ^ _ ^
One result can be seen in the picture below. In this example the password consists of only 6 and 5 digits. Estimated time required is only about 5 minutes

like the title of this blog "How To Hack", I will give some way to hack MS Word document, in fact I do not aim to teach or be a Hacker Hack, this is just an ingredient for learning only. just ok
I want to share ideas to break into MS Word document that has been fitted with a password. For this problem I use a tool that is quite popular opening password is "Passware" the original source downloaded from http://lostpassword.com. Which of course has been modified (was crack) by people who like the freedom of course.
get on with it. first, download tool here. After unpack and install it on as usual (do not forget to enter the serial number that is in cracks.txt).
Run the program, take from the start menu - Passware - Office Key. See the picture below.
Before running, do the setup first. aim to make it more effective to use. Click the Settings menu, select General on the Bruce forceAttack types (other options contengnya marks omitted) then OK.
on the choice
Then click Recover to find and open a MS Word file was password that you want at the unloading password. Wait a moment until the program will process the documents out the password (preferably one that is open programs be closed, because the program requires a large memory resource). The length of the password depends on the length unload password installed. For 4-digit password can be less than 30 seconds, to 5-6 digits can reach 2-10 menitan. For passwords that can wait even longer while sleeping alone .. he he ... ^ _ ^
One result can be seen in the picture below. In this example the password consists of only 6 and 5 digits. Estimated time required is only about 5 minutes
Once again the authors emphasize that the former do not feel safe about something, everything could happen. And that certainly is good science should be applied to the well too. Good luck.
Subscribe to:
Posts (Atom)