Blog 4 Jordan Day

Visitor of the day


  • You
    from

Brag Stats

  • Comments:25,004
  • Articles:2,000
  • Article Hits:12,459,805
  • Unique Visitors:2,000,438
  • Rss Subscribers:3,052
  • Comment Subscribers:2,530
  • Spammers:136,315
  • Generated :757,671 spams
  • Monitoring:3,942,477 spam IPs
Powered by Qwaider Shield

Recent Comments

Check out the latest pictures on Sweetestmemories

« Nasty BUG! 5000 lost commentsPreviewing: Hancock (2008) »

Hacking 2.0

  • By: Qwaider

  • On:Friday, June 27, 2008 9:02:27 AM
  • In:Thoughts
  • Viewed: (5808) times

    • Currently 4.6/5 Stars.
    • 1
    • 2
    • 3
    • 4
    • 5

    Rated 4.6/5 stars (115 votes cast)

    WEB 2.0, the amazing wonderfully connected world, with services spanning social networks, social tagging and just about anything useful and social.

    The next generation of Hacking, is exactly like the old generation. Based more on Social engineering than actual programming, and algorithmic might. Possibly even less on finding exploits and vulnerabilities and relying more on the tried and tested, the ultimate form of hacking.

    Again, the buzz words seem to always contain social in them.

    Welcome the wonderful world of Hacking 2.0!

    The new Internet is different, and although it's as connected as it has always been, it feels more connected. You're able to search for (but more importantly find) things easily. You're able to research people and event, and unlike the old days when people had to come snooping around your neighborhood asking little kids about you, and calling your neighbors to get details about you. People are actually volunteering loads of information at everyone's finger tips

    From Myspace, to Facebook, to social bookmarking to activity monitors. People are broadcasting the universe what they're doing, where they're going, who did they dine with, and who their friends are.

    It does take a small amount of intelligence (but not a rocket scientist) to connect all the dots and know who exactly is who's friend, find them on facebook, figure out their friends and get to them through their friends. That's only one way of doing business. Not to mention Phishing, spoofing, Trojans, malware and a million other attack vector at the totally clueless individual who's just super excited about being able to see his picture on blogs he visits in the Myblogrolling section.

    If you manage to look at one of these cookies you will discover a wealth of information. Where they user was, what name he used, how long did he stay, what he clicked, and track them as they hop from one site to another site. But that's all old news

    What Hacking 2.0 is all about is exploiting the human side of the equation. Using smoke and mirrors into fooling people into providing information. Verifying their email accounts, and exposing their intimate details without even suspecting that they're not even talking to someone authorized to do so!

    The next step, Hacking 3.0 is this...

    Psychic paper

    And it's called, Psychic paper, from the famous TV Series, Doctor Who. Where "The Doctor" flashes a blank paper, and people's mind gives the the illusion that they're seeing what they want to see!

    And that's how it's done, by making the victim see what they want to see, utilizing less technology and more social skills!

    Now, do you know who snitched on you? Your own best friend! That's Hacking 2.0, leave the kernel debugger alone!

    Other Memories Documented on June 27
    « Nasty BUG! 5000 lost commentsPreviewing: Hancock (2008) »

    Memories....

    There have been no comments made on this article. Why not be the first and add your own comment using the form below.

    You too can have your Memories Documented

    Country:

    HTML has been disabled but if you wish to add any hyprlinks or text formating you can use any of the following codes: [B]bold text[/B], [I]italic text[/I], [U]underlined text[/U], [S]strike through text[/S], [URL]http://www.yourlink.com[/URL], [URL=http//www.yourlink.com]your text[/URL]

    Whisper (your comment will not be displayed)

    Please refer to Commenting policy


    Notify me of follow-up comments by email
    « Nasty BUG! 5000 lost commentsPreviewing: Hancock (2008) »
    Read by:
  • Guest-
  • |
  • Guests(3)-
  • |
  • Guest-
  • |
  • Guests(5)-
  • |
  • Guests(50)-
  • |
  • Yassir-
  • |
  • Guest-
  • |
  • Guests(195)-
  • |
  • Guest-
  • |
  • Guests(21)-
  • |
  • Guests(480)-
  • |
  • Guest-
  • |
  • Guest-
  • |
  • Guest-
  • |
  • Guests(56)-
  • |
  • Guests(6)-
  • |
  • Guests(24)-
  • |
  • Guests(10)-
  • |
  • laila-
  • |
  • Guests(35)-
  • |
  • Guests(600)-
  • |
  • Guests(128)-
  • |
  • Guest-
  • |
  • Guests(25)-
  • |
  • Guests(18)-
  • |
  • Guests(2)-
  • |
  • Guests(4)-
  • |
  • Guests(50)-
  • |
  • Guests(5)-
  • |
  • Guests(28)-
  • |
  • Guests(11)-
  • |
  • Hani Obaid-
  • |
  • iffffffff-
  • |
  • Khaled-
  • |
  • Shaher-
  • |
  • Guests(63)-
  • |
  • Guests(13)-
  • |
  • Guests(5)-
  • |
  • Diana-
  • |
  • Guests(2)-
  • |
  • Guests(4)-
  • |
  • Guests(15)-
  • |
  • Guests(3)-
  • |
  • Guest-
  • |
  • Guests(177)-
  • |
  • Guests(26)-
  • |
  • Guest-
  • |
  • Guests(2)-
  • |
  • Guest-
  • |
  • Guests(18)-
  • |
  • Guests(2)-
  • |
  • Guest-
  • |
  • Guest-
  • |
  • Guests(127)-
  • |
  • Guests(3)-
  • |
  • Guest-
  • |
  • en.co.nz-
  • |
  • Guests(54)-
  • |
  • Guests(3)-
  • |
  • Guests(10)-
  • |
  • Guests(2)-
  • |
  • Guest-
  • |
  • Guests(5)-
  • |
  • Guests(12)-
  • |
  • Guests(37)-
  • |
  • Batoul-
  • |
  • Guests(3430)-
  • |
  • Maioush-
  • |
  • nobody-
  • |
  • Guest-
  • |
  • Guests(2)-
  • |
  • Guests(4)-