Sunteți pe pagina 1din 5

If you want to become a Hacker you must know this information.

Presented by Ly Chanraksmey | Bestboyloveu@yahoo.com

Beginners Dictionary

Spoiler (Click to Hide) - HFA - Hack For All - F.B.I. - Federal Bureau of Investigation - UD - Undetected - FUD - Fully Undetected - AV - Antivirus - binder/joiner - A tool used to combine multiple files with different settings related to execution for each file - KeyGen - Key Generator, to crack sharewares - SN - Serial Number - OS - Operational System - WIN - Windows - UNIX - Linux Engine - P2P - Peer to Peer - EOF Data - End of File Data : data that's written after the end of the file. Requires crypter/binder to crypt/bind files that have this - PE - Portable Executable - EP - Entry Point - OEP - Original Entry Point - Script Kiddie - Someone that calls them self a hacker yet they just use pre made programs - Haxor - Hacker - Backdoored - A file infected for spywares - Offset - The "line address" to PE hex format - PWNED -OWNED - 1337 -Leet (Elite) - POC - Proof of concept - SE - Social Engineering - sploit - Exploit - RE - Reverse connection/reverse engineering - RS - Rapidshare (File sharing network) - PI - Poison Ivy - L/RFI - Local/Remote File Injection - XSS - Cross Site Scripting - VB - Visual Basic - SRC - "Source" Code - RAT - Remote Administration Tool - VPN - Virtual Private Network - APP - Application/ Executable File - crypter - Application that encrypts/hides any kind of file(mostly) from antiviruses/etc. - n00b - Beginner - Skid/Skiddie - Someone that doesn't want to learn hacking yet wants to be a '1337 Haxor' - HHE/ HHFE - Spam File Format - UNIX - Type of operating system mostly seen in government computers and research type

Presented by Ly Chanraksmey | Bestboyloveu@yahoo.com

supercomputers as well as big business - LINUX - Is the kernel that has its root in the UNIX land and is mainly meant for personal computers as well as big business and government - OS - Operating System/Open Source - Open Source - Programs that are distributed with the source code of the program so that everyone can use or modify it to their liking - tc - Take care - AV - Anti-virus - Bots - Infected customers used to respond at commands - IRC - Internet Relay Chat - y - Why or Yes - wb - Welcome Back - EOF Data - End of File Data : Data that's written after the end of the file - CSRF - Cross site request Forgery - PID - Product Identification (like PID scamming with Microsoft)

Insults
Spoiler (Click to Hide) - STFU - Shut The Fuck Up - GTFO - Get The Fuck Out! - WTF - What The fuck! - WTAF - What The Absolute Fuck! - RTFM - Read The Fucking Manual

What do they mean?


IP Address Spoiler (Click to Hide) An Internet Protocol (IP) address is a numerical identification and logical address that is assigned to devices participating in a computer network utilizing the Internet Protocol for communication between its nodes.[1] Although IP addresses are stored as binary numbers, they are usually displayed in human-readable notations, such as 208.77.188.166 (for IPv4), and 2001:db8:0:1234:0:567:1:1 (for IPv6). The role of the IP address has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[2] The original designers of TCP/IP defined an IP address as a 32-bit number[1] and this system, now named Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the resulting depletion of the address space, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995[3] and last standardized by RFC 2460 in 1998. [4]

Presented by Ly Chanraksmey | Bestboyloveu@yahoo.com

The Internet Protocol also has the task of routing data packets between networks, and IP addresses specify the locations of the source and destination nodes in the topology of the routing system. For this purpose, some of the bits in an IP address are use d to designate a subnetwork. The number of these bits is indicated in CIDR notation, appended to the IP address, e.g., 208.77.188.166/24. With the development of private networks and the threat of IPv4 address exhaustion, a group of private address spaces was set aside by RFC 1918. These private addresses may be used by anyone on private networks. They are often used with network address translators to connect to the global public Internet. The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally. IANA works in cooperation with five Regional Internet Registries (RIRs) to allocate IP address blocks to Local Internet Registries (Internet service providers) and other entities.

Port Spoiler (Click to Hide) In computer programming, port has a wide range of meanings. A software port (usually just called a 'port') is a virtual/logical data connection that can be used by programs to exchange data directly, instead of going through a file or other temporary storage location. The most common of these are TCP and UDP ports which are used to exchange data between computers on the Internet.

Spoiler (Click to Hide) A Trojan horse, or trojan for short, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system. The term comes from the Trojan Horse story in Greek mythology. Trojan horses are not self-replicating which distinguishes them from viruses and worms. Additionally, they require interaction with a hacker to fulfill their purpose. The hacker need not be the individual responsible for distributing the Trojan horse. It is possible for hackers to scan computers on a network using a port scanner in the hope of finding one with a Trojan horse installed.

Virus Spoiler (Click to Hide) A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term "virus" is also commonly but erroneously

Presented by Ly Chanraksmey | Bestboyloveu@yahoo.com

Trojan

used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. [1][2] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, Trojan horses, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software), including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a p rogram that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have s ymptoms noticeable to the computer user, but many are surreptitious. Most personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, Instant Messaging, and file sharing systems to spread.

DNS Spoiler (Click to Hide) Domain Name System. The distributed database, sometimes including all the supporting hardware or software infrastructure, the Internet uses to translate hostnames into IP numbers and provide other domain related information.

File Binder Spoiler (Click to Hide) File binders are applications that allow a user to "bind" executable together resulting in a single executable. They are useful for hackers to insert other applications such as Trojan horse executable into otherwise harmless files.

http://www.hackforall.com

Presented by Ly Chanraksmey | Bestboyloveu@yahoo.com

S-ar putea să vă placă și