Afstemning: Hvad er i 
Blå
8.33%
1 8.33%
Grå
66.67%
8 66.67%
Sort
8.33%
1 8.33%
Hvid
16.67%
2 16.67%
Total 12 stemmer 100%
* Du stemte på denne valgmulighed. [Vis resultater]

Tråd bedømmelse:
  • 0 Stemmer - 0 Gennemsnit
  • 1
  • 2
  • 3
  • 4
  • 5
Hvad er i?
10-06-2013, 09:26
#1
Hvad er i?
HEy SS.
Jeg sad og tænkte lidt over hvad i endelig betragte jeg selv som?
I må meget gerne komme med en begrundelse neden under.
Jeg vil selv betragte mig som Gray, da jeg kun hacker some whitehat men er der noget der står i vejen så går jeg ikke udenom.
Jeg menere også selv at Blackhat metoder tit er meget effektive, så dem bruger jeg også tit... Men stem og skriv en begrundelse.

Har lige copy, pasted hvad WIKI siger om Blue,Black,white,Gray.

White hat
Main article: White hat
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants, is one of those organisations that have developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking

Black hat
A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. They choose their targets using a two-pronged process known as the "pre-hacking stage".
Part 1: Targeting
The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the primary target that he/she was planning to attack or steal from. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).

Grey hat
Main article: Grey hat
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.

Blue hat
A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events
There is 3 rules for a life.
1. fuck.
2. Dont give a fuck.
3. Dont be fucked over
Find alle beskeder fra denne bruger
Citer denne besked i et svar
10-06-2013, 12:03
#2
RE: Hvad er i?
Jeg er rød hat.

:o?

35charhqpost
Find alle beskeder fra denne bruger
Citer denne besked i et svar
10-06-2013, 12:19
#3
RE: Hvad er i?
Blue hat = White hat.

Men hey, hold forummet på dansk! Oversæt det hvis det er ;)
yolo
Find alle beskeder fra denne bruger
Citer denne besked i et svar
10-06-2013, 15:17 (Denne besked var sidst ændret: 10-06-2013, 15:19 af Doctor Blue.)
#4
RE: Hvad er i?
Jeg har da enkelte gange været inde på sider for at lege rundt og afprøve min viden om de forskellige ting, men ikke så meget andet.
Som det er nu, så lærer jeg det bare for at forstå hvordan jeg kan passe på mine egne ting, det burde være almen viden, men det er det ikke.

EDIT: og ja
"individuals who perform penetration tests and vulnerability assessments"
er rimeligt meget det samme som
"someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed"

Om du gør det en gang eller på kontrakt har intet med farven på din hat at gøre
Mangler du hjælp?
Regler |  E-mail (PGP)
Besøg denne brugers hjemmeside Find alle beskeder fra denne bruger
Citer denne besked i et svar
« Ældre | Nyere »




User(s) browsing this thread: 1 Gæst(er)