Sunteți pe pagina 1din 15

Social networking service

..Written by Ch.Manikyam(1st M.E.C.S)

A social networking service is an online service, platform, or site that focuses on building and
reflecting of social networks or social relations among people, who, for example, share interests
and/or activities. A social network service essentially consists of a representation of each user
(often a profile), his/her social links, and a variety of additional services. Most social network
services are web based and provide means for users to interact over the Internet, such as e-mail
and instant messaging. Online community services are sometimes considered as a social network
service, though in a broader sense, social network service usually means an individual-centered
service whereas online community services are group-centered. Social networking sites allow
users to share ideas, activities, events, and interests within their individual networks.[citation needed]
The main types of social networking services are those which contain category, means to connect
with friends and a recommendation system linked to trust. Popular methods now combine many
of these, with Facebook and Twitter widely used worldwide, Nexopia (mostly in Canada);Bebo,
VKontakte, Hi5, Hyves , Draugiem.lv (mostly in Latvia), StudiVZ (mostly in Germany), iWiW
(mostly in Hungary), Tuenti (mostly in Spain), Nasza-Klasa (mostly in Poland), Decayenne,
Tagged, XING, Badoo and Skyrock in parts of Europe; Orkut and Hi5 in South America and
Central America;and Friendster, Mixi, Multiply, Orkut, Wretch, renren and Cyworld in Asia and
the Pacific Islands and LinkedIn and Orkut are very popular in India.
Symbol of networking service:

Social impacts
Web based social networking services make it possible to connect people who share interests and
activities across political, economic, and geographic borders. Through e-mail and instant
messaging, online communities are created where a gift economy and reciprocal altruism are
encouraged through cooperation. Information is particularly suited to gift economy, as
information is a non rival good and can be gifted at practically no cost.
Facebook and other social networking tools are increasingly the object of scholarly research.
Scholars in many fields have begun to investigate the impact of social networking sites,
investigating how such sites may play into issues of identity, privacy,social capital, youth
culture, and education.
Several websites are beginning to tap into the power of the social networking model for
philanthropy. Such models provide a means for connecting otherwise fragmented industries and
small organizations without the resources to reach a broader audience with interested
users.Social networks are providing a different way for individuals to communicate digitally.
These communities of hypertexts allow for the sharing of information and ideas, an old concept
placed in a digital environment.
In 2011, HCL Technologies conducted research which showed that 50% of British employers had
banned the use of social networking sites/services during office hours.
Different Types Of Social networking
Blogs.Microblogs.Photosharing sites.Video sharing sites. I know personally that trying to
understand all of these different types of social media and how they work together can feel
like trying to understand Einsteins Theory of Relativity.
Im gonna try and keep things simple for us here, by focusing on the different kinds of social
media rather than all the different ways to integrate social media into your organization. Thats
really not something you can learn in a single blog post.
So clear your mind and throw all your baggage in the trunk. Were gettin ready to head down the
next stretch of the road on our social media road trip as we take a look at different kinds of social
media.
Social networking Facebook, Twitter, LinkedIn
Social networking sites allow users to add friends, send messages and share content. People on
social networking sites group in communities of like-minded interest. IMPORTANT: 1) The
other types of social media outlined here also allow for networking, though theyre typically
more focused on content sharing. 2) Dont assume your audience isnt participating in social
networking. The growth of Facebook for example is phenomenal. The rate at which it is growing
with men and women in their 60s even is staggering.

Six types of networks


In an extension of the ideas of social network analysis, Karen Stephensons Quantum Theory of
Trust, an article from Strategy+ Business (4th Quarter, 2002), includes a list of six different types
of networks. See page 11 for more explanation of each of these (Note: May need to sign up for
free registration.
1. Work network: With whom do you exchange information as part of your daily work
routines?
2. Social network: With whom do you check in, inside and outside the office, to find out
what is going on?
3. Innovation network: With whom do you collaborate or kick around new ideas?
4. Expert knowledge network: To whom do you turn for expertise or advice?
5. Career network: Whom do you go to for advice about the future?
6. Learning network: Whom do you work with to improve existing processes or methods?
[This seems a little odd it is very much couched in terms of the workplace, rather than
the people with whom I work to advance my own knowledge.

Educational applications

The National School Boards Association reports that almost 60 percent of students who use
social networking talk about education topics online and, surprisingly, more than 50 percent talk
specifically about schoolwork. Yet the vast majority of school districts have stringent rules
against nearly all forms of social networking during the school day even though students and
parents report few problem behaviors online.
Social networks focused on supporting relationships between teachers and their students are now
used for learning, educator professional development, and content sharing. Ning for teachers,
Learn Central, TeachStreet and other sites are being built to foster relationships that include
educational blogs, eportfolios, formal and ad hoc communities, as well as communication such

as chats, discussion threads, and synchronous forums. These sites also have content sharing and
rating features.
Social networks are also emerging as online yearbooks, both public and private. One such
service is MyYearbook which allows anyone from the general public to register and connect. A
new trend emerging are private label yearbooks only accessible by students, parents and teachers
of a particular school similar to Facebook beginning within Harvard.
Finance applications

The use of virtual currency systems inside social networks create new opportunities for global
finance. Hub Culture operates a virtual currency Ven used for global transactions among
members, product sales and financial trades in commodities and carbon credits. In May 2010,
Carbon pricing contracts were introduced to the weighted basket of currencies and commodities
that determine the floating exchange value of Ven. The introduction of carbon to the calculation
price of the currency made Ven the first and only currency that is linked to the environment.

Medical applications

Social networks are beginning to be adopted by healthcare professionals as a means to manage


institutional knowledge, disseminate peer to peer knowledge and to highlight individual
physicians and institutions. The advantage of using a dedicated medical social networking site is
that all the members are screened against the state licensing board list of practitioners.
The role of social networks is especially of interest to pharmaceutical companies who spend
approximately 32 percent of their marketing dollars attempting to influence the opinion leaders
of social networks.
Hacker (computer security)
A hacker is a person who breaks into computers and computer networks for profit, in protest, or
because they are motivated by the challenge.The subculture that has evolved around hackers is
often referred to as the computer underground but it is now an open community.
Other definitions of the word hacker exist that are not related to computer security. They are
subject to the long standing hacker definition controversy about the true meaning of hacker. In
this controversy, the term hacker is reclaimed by computer programmers who argue that
someone breaking into computers is better called a cracker,not making a difference between
computer criminals (black hats) and computer security experts (white hats). Some white hat
hackers claim that they also deserve the title hacker, and that only black hats should be called
crackers.

Timeline of computer security hacker history


In todays society understanding the term hacker is complicated because it has many different
definitions. The term can be traced back to MIT (Massachusetts Institute of Technology). MIT
was the first institution to offer a course in computer programming and computer science and it
is here in 1960 where a group of MIT students taking a lab on artificial intelligence first coined

this word. These students called themselves hackers because they were able to take programs and
have them perform actions not intended for that program. The term was developed on the basis
of a practical joke and feeling of excitement because the team member would hack away at the
keyboard hours at a time.
Hacking developed alongside phone phreaking, a term referred to exploration of the phone
network without authorization, and there has often been overlap between both technology and
participate. One of the first hacks was accomplished by Joe Engressia also known as The
Whistler. Engressia is known as the grandfather of phreaking. His hacking technique was that he
could perfectly whistle a tone into a phone and make a free call.Bruce Sterling traces part of the
roots of the computer underground to the Yippies, a 1960s counterculture movement which
published the Technological Assistance Program (TAP) newsOther sources of early 1970s hacker
culture can be traced towards more beneficial forms of hacking, including MIT labs and
the Homebrew Computer Club, which later resulted in such things as early personal computers
and the open source movement.

Artifacts and customs


The computer underground is heavily dependent technology. It has produced its own slang and
various forms of unusual alphabet use, for example 1337speak. Writing programs and
performing other activities to support these views is referred to as hacktivism. Some go as far as
seeing illegal cracking ethically justified for this goal; a common form is website defacement.
The computer underground is frequently compared to the Wild West. It is common among
hackers to use aliases for the purpose of concealingidentity, rather than revealing their real
names.

Hacker groups and conventions


Main articles: Hacker conference and Hacker group

The computer underground is supported by regular real-world gatherings called hacker


conventions or hacker cons. These draw many people every year
including SummerCon (Summer), DEF CON,HoHoCon (Christmas), ShmooCon (February),
BlackHat, Hacker Halted, and H.O.P.E..In the early 1980s Hacker Groups became popular,
Hacker groups provided access to information and resources, and a place to learn from other
members. Hackers could also gain credibility by being affiliated with an elite group.
Hacker attitudes
Several subgroups of the computer underground with different attitudes and aims use different
terms to demarcate themselves from each other, or try to exclude some specific group with which
they do not agree. Eric S. Raymond (author of The New Hackers Dictionary) advocates that
members of the computer underground should be called crackers. Yet, those people see
themselves as hackers and even try to include the views of Raymond in what they see as one
wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker
dichotomy, they give more emphasis to a spectrum of different categories, such as white
hat, grey hat, black hat and script kiddie. In contrast to Raymond, they usually reserve the term
cracker. According to (Clifford R.D. 2006) a cracker or cracking is to gain unauthorized access
to a computer in order to commit another crime such as destroying information contained in that
system. These subgroups may also be defined by the legal status of their activities.
Attacks

A typical approach in an attack on Internet-connected system is:


1.Network enumeration: Discovering information about the intended target.
Vulnerability analysis: Identifying potential ways of attack.

Exploitation: Attempting to compromise the system by employing the vulnerabilities found


through the vulnerability analysis.
In order to do so, there are several recurring tools of the trade and techniques used by computer
criminals and security experts.
Exploits
Main article: Exploit (computer security)
A security exploit is a prepared application that takes advantage of a known weakness. Common
examples of security exploits are SQL injection, Cross Site Scripting and Cross Site Request
Forgery which abuse security holes that may result from substandard programming practice.
Other exploits would be able to be used through FTP, HTTP, PHP, SSH, Telnet and some webpages. These are very common in website/domain hacking.
Techniques
Private firewall:-

Vulnerability scanner
A vulnerability scanner is a tool used to quickly check computers on a network for known
weaknesses. Hackers also commonly use port scanners. These check to see which ports on a
specified computer are open or available to access the computer, and sometimes will detect
what program or service is listening on that port, and its version number.
Password cracking is the process of recovering passwords from data that has been stored in or
transmitted by a computer system. A common approach is to repeatedly try guesses.
Orkut hacking

Ever wondered how to hack Orkut account? Well, here are some of the ways through which you
can gain access to Orkutaccount.Google uses a 4 Level Orkut login feature which makes it
difficult to hack it using brute force attack. Hence, it is almost impossible to use the brute
forceapproach to gain access to Orkut account. Before we discuss on how to hack Orkut, let
us take a look at the 4 level secure login features.
First Level - Security-SSL or 128 bit secured connection

Second Level - Orkut account checks for the presence cookie in the users system
Third Level - Orkut provides a redirection to the entered User information
Fourth Level - Orkut doesnt use conventional php/aspx/asp coding. So, it is impossible to hack
Orkut using input validation attack!!!
So, it is not an easy task to hack Orkut by breaking this security! However, there are some people
who still manage to gain access to others Orkut accounts. The question concerned is how they
do it?Many of them just use simple tricks that fool users by making them to leak out their
password by themselves. Read on to discover the tricks used by hackers to hack Orkut account.

Ways to Hack Orkut Account


1. Using a Keylogger is one of the Easiest Way to Hack Orkut password. Keylogger
programs can spy on what the user types on his/her computer keyboard. A Keylogger
program operates in a complete stealth mode and thus remains undetected. Hence, the victim will
never come to know about its presence on his computer.
A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware
device or small program that monitors each keystroke a user types on a specific computers
keyboard. A keylogger program is widely available on the Internet. One of thebest is listed
below:
SniperSpyA detailed information on keylogger hack can be found in my post on How to
Hack an Email Account.
2. Phishing Attack it is the most popular way of hacking/stealing others password. This attack
works by using fake login pages (login pages that look exactly same as that of Orkut, but a fake
one) to fool innocent users to enter their Orkut username and password in these fake login pages
instead of the real ones. When the users land on a fake login page, they enter their Orkut
username and password thinking it to be the real one, but actually, it is other way round. It
submits all the entered details to the creator (usually the hacker) of the fake login page.
3. Orkut New Features Trick: Some websites on Internet claims to offer many additional
features for Orkut users. Usually, these websites will offer a login page from their own website
and force users to login to their Orkut account from this page itself inorder to gain access to the
additional features. In fact, these websites are nothing more than a scam.
4. Community Links: Many times you are provided with a link to a community in a scrap.
Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?
cmm=22910233 OKRUT not ORKUT. This is definitely a trap created by the hacker to hack
your Orkut password. Clicking on this link will take you to a fake login page where you end up
losing your password.
5. Java script: You must have seen the circulating scraps that asks you to paste a certain code
(javascript) onto your address bar. Well, sometimes these scripts will hijack your session by
stealing your cookie. So, it is better to avaoid running any unknown script from your orkut
account.
So, I hope that this article will not only teach you how to hack Orkut, but also tell you how
to protect your Orkut account being hacked.

What to do when your Orkut Account is Hacked ?

It can be a nightmare if someone else takes control of your Google Account because all your
Google services like Gmail, Orkut, Google Calendar, Blogger, AdSense, Google Docs and even
Google Checkout are tied to the same account.
Here are some options suggested by Google Support when your forget the Gmail password or if
someone else takes ownership of your Google Account and changes the password:
1. Reset Your Google Account Password:Type the email address associated with your Google
Account or Gmail user name atGmail Forgot Password Link you will receive an email at
your secondary email address with a link to reset your Google Account Password.
2. For Google Accounts Associated with Gmail:If you have problems while logging into your
Gmail account, you can consider contacting Google by filling this form. It however requires you
to remember the exact date when you created that Gmail account.
3. For Hijacked Google Accounts Not Linked to Gmail:If your Google Account doesnt use a
Gmail address, contact Google by filling this form. This approach may help bring back your
Google Account if you religiously preserve all your old emails. You will be required to know the
exact creation date of your Google Account plus a copy of that original Google Email
Verification message.

Hack Facebook Password Facebook Hacking

Wondering to know how to hack Facebook password? Well, before you can do that, it is very
much necessary to understand the real ways of hacking that actually work and also those that are
simply scam and do not work. So in this post, well look at some of the possible ways to hack
Facebook password!
Every day I get a lot of emails from people requesting me to hack Facebook passwords of their
spouse, girlfriend or boyfriend so as to reveal their secret relationships (if any). Most of them are
even willing to pay for the service. However, I strongly deny any such requests since I do
not provide any paid hacking service. But anyhow, I have decided to write down this post so that
you can learn the tricks for yourself and implement everything at your own risk, 7 years in the
field of ethical hacking and security, all I can tell you is that there are only two ways to
successfully hack Facebook password.
Possible Ways to Hack Facebook Password
1. Keylogging The Easiest Way!
Keylogging refers to simply recording each and every keystroke that is typed on a specific
computers keyboard. This is possible with the use of a small computer program called keylogger
(also known as spy software). Once installed, this program will automatically load from the startup, runs in the invisible mode and start capturing each and every keystroke that was typed on the
computer.
Some keyloggers with advanced features can also capture screenshots and monitor every activity
of the computer. One doesnt need to have any special knowledge in order to install and use a
keylogger. That means, anyone with a basic knowledge of computer can install and use this
software with ease. Hence for a novice computer user this method is the easiest way to hack
Facebook password. I recommend the following keylogger as the best for gaining access to
Facebook account.

Why SniperSpy is the best?


Today there exists hundreds of keyloggers on the market but most of them are no more than a
crap. However, there are only a few that stand out of the crowd and SniperSpy is the best among
them. I personally like SniperSpy for its REMOTE INSTALLATION FEATURE. With
this, you can install it on a remote computer without the need for having physical access to it. It
operates in a complete stealth mode so that it remains undetected.
1.-Access ANY Password
With SniperSpy you can hack any password and gain access to Facebook or any other online
account.
2.-Monitor-Every-Activity
You can monitor every activity of the target computer, take screenshots and record chats & IM
conversations.

3.-Never-Get-Caught!
SniperSpy operates in a total stealth mode and thus remains undetectable. Therefore you need
not have the fear of being traced or getting caught.

4.-Remote-Installation-Feature
With the Remote Install feature, it is possible to install it even on computers for which you do
not have physical access. However, it can also be installed on a local computer.

5.-Extremely-Easy-to-Use
Installing and using SniperSpy is simple and needs no extra skill to manage.
6.compeletly safe to use:

This software is 100% safe to use since it does not collect any personal information from your
computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy
for its users.
7.works-on-both-windows-and-mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.So what are you waiting for? If you
are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and
expose the truth!

How to Protect a Computer From Hackers

Hackers and identity thieves are constantly on the prowl, looking for vulnerable computer
systems to break into. The worst thing you can do is to simply assume that your computer is safe.
Implement basic tips and precautions to help protect your computer from hackers.
Difficulty

Instructions
Things Youll Need

A computer with an Internet connection


1

First and foremost, download and install an anti-virus application. A few of the free anti-virus
applications include Microsoft Security Essentials
(microsoft.com/security_essentials/default.aspx),

Keep your operating system up-to-date with the latest security patches.

Run virus scans on a fairly frequent basis. Pick a time when youre not using the computer
because running a virus scan will slow your computer down significantly. Scan your hard drive a
minimum of once a week, but two to three times a week is ideal.

It may be tempting to shoot the UFO out of the sky or other types of things

S-ar putea să vă placă și