Hacking

in #hacking6 years ago

                            img src 

In the era of information technology, many people familiar with both the Internet and the server word. Security issues are important in the world of this world.

Important and confidential information is kept in it. The information team seeks to steal the world. When they found a security flaw in the system, they carried out technical attacks. Information takes over. Then using it for personal interest, enjoys many benefits. This work is called hacking, hackers Hacking to the young technicians is exciting and curious. Many of them do not know the hard punishable crimes in hacking cases. Unauthorized hacking is considered as a cybercrime-around the world-

The way hacking is done

Hackers who are hacking are called hackers.

Hackers have legitimate or illegal access to computer related systems. From this arrangement, they can find security flaws, such as helping individuals or organizations, and if they want to break the security measures, they can enjoy individualism. People with good knowledge about computers and networking do such things. Hacking is done through BIOS chips. BIOS chip firmware on a computer's motherboard. It contains microchip BIOS helps to boot the computer and load the operating system. It penetrates into the original software, which is operated under antivirus and other security products. Generally antivirus do not scan them. Hackers can easily provide malware here. Sometimes the malware is removed from the computer's operating system or if it is installed again. Later hacking attacks can be carried out via e-mail or physically interactive in the system. Researchers call it an 'in-vitna vulnerabilities'.

This allows hackers to enter the BIOS. Once the BIOS compromises, the system gives them the maximum advantage. Then they take control of all the systems.

Hacking and hacker

The word hacking is quite familiar to technicians. The youth started hacking in search of exciting experiences. At the beginning of the hobby, some later became professionals. Hacking and hacker words so attract the teenager Hacking is basically a method, which allows anyone to enter into a computer or computer network without valid permission. Hackers who are hacking are called hackers. There may be many types of hacking. If we use our mobile phones, land phones, car tracking, different electronics and digital devices without valid permission, then it can also be called hacking. Hackers usually hack the errors of these electronic devices, and then hack them. There are different types of hacking. Depending on how much cybercrime hacking is right.

http://www.bd-pratidin.com/assets/archive/images/Print-Edition/2016/March/20-03-2016/2(1).jpg

                              img src 

White Hat Hacker

It's a totally unauthorized work that many people think about when hacking comes to mind. But there are a team of hackers who hacking people or organization important computing system more secure and perfect. They find out the system's security flaws by hacking and fix it. It could be a computer, a computer network, server or any website. Hackers are called White Hack Hacker.

http://www.bd-pratidin.com/assets/archive/images/Print-Edition/2016/March/20-03-2016/3(1).jpg

                               img src 

Gray hat hacker

Between good and bad, the Gray hat hackers There is more to the number of gray hat hackers in the world. They mostly work like white hat hackers. However, in some cases, they are attempting to self-interest or self-propelled the attack on the motivated network. They roam the world like a stranger. He worked very hard. They sometimes help the owner of the security system by mistake, sometimes it will hurt.

http://www.bd-pratidin.com/assets/archive/images/Print-Edition/2016/March/20-03-2016/4(1).jpg

                             img src 

Black Hat Hacker

They are the main panic of hacking. Over the years, they have panicked in the hacking word. Black hat hackers are the most dangerous hackers. None of the young people or organizations were spared from their hands. When they find a security system error, they quickly use it for their own sake. Ever ruined the entire system, spreading different viruses. They are able to make arrangements to control the system again in the future.

http://www.bd-pratidin.com/assets/archive/images/Print-Edition/2016/March/20-03-2016/5(1).jpg

                              img src 

Bank looted in hacking

650 million euros of Russian hackers looted: 650 million euro was removed by hackers. This is one of the biggest bank lootings in the world by hacking. A group of Russian hackers robbed a large amount of money from British Bank. It was able to loot huge money from at least 100 financial institutions. Hackers 

By using the system on the bank's own network. There spread malware. In this, the hackers received information about the transactions and accounts of the bank. Slowly they started withdrawing money as planned very much. The huge amount of money they invented in the light of the legal transaction. Although panic is said to be worth 650 million euros, it is difficult to say exactly what it is. Because the bank has not yet released the actual amount. By checking the bank transactions system, it is known that malware enters its system through an e-mail. Then it starts sending money from the account. Hackers took control of the system in such a way that it was not detected even at the level of administrator. They lasted for at least four months of transactions in various financial institutions.

This is the bank. There are many examples of ATM card fraud cases. One such incident happened in 'Global Payments Incorporation'

ATM fraud of 'Global Payments Incorporation': At Atlanta, the hacker is losing 1.5 million US dollars. This happened in February 2012. Visa, MasterCard, warns them that the security of their organization's credit card is questioned. In 2011 there were also a number of conferences. If their company appears to be reliable, then the head was not sweated. However, the main event happened a few months later. Some of their branches complain that their transactions do not seem normal. Visa, the master card fraud has clutched the cycle. They have strengthened the security of illegal and unusual transactions. However, this pre-production was not enough. Hackers enter their system and trick them into everything. Although initially known to have lost $ 1.5 million, it was finally known that the figure exceeded 94 million US dollars. There is a debate on this plot. Of course, they spent $ 36 million in fine and more than 60 million dollars for the investigation.

Star William's Levin in Hacking Accounts: Vladimir Levine is James Bond of 1940. Russian-born Vladimir was a brilliant mathematician. St. Petersburg studied biochemistry from the Berg State Institute. In 1944, Vladimir transferred 10 million dollars to his account through the dial-up war transfer service. He collected funds from several thousand accounts of City Bank of different countries like Finland, the United States, Netherlands, Germany and Israel.

Stolen in Bangladesh Bank: It's a whole new experience in Bangladesh's context. Earlier, Bangladesh never hacked big money in hacking cases. Hackers have stolen Tk 800 million from Bangladesh Bank's foreign currency reserve China-based hacker group has hacked money from the Reserve Bank of Bangladesh Reserve Bank of the Federal Reserve Bank of New York on February 5. This money has been withdrawn by the hacking in Sri Lanka and the Philippines. This hacking money from a bank robbery. Each bank has some swift codes, with which each bank transacts with the Reserve Bank. The hackers removed these swift codes through hacking and removed nearly $ 80 million from their federal bank account conveniently. The fifth position in the history of theft of most money from the bank. The government and Central Bank of around 250 countries of the world reserve deposits in the Federal Reserve. Identifying three IDs which have been hacked by the ID of the Bangladesh Bank, the investigating team - the three IDs which were withdrawn by hacking money. How is this ID hack is being investigated in detail?

Follow me : mdsheik675

Coin Marketplace

STEEM 0.26
TRX 0.12
JST 0.031
BTC 61258.08
ETH 2873.80
USDT 1.00
SBD 3.56