عنوان الموضوع : بحث حول القرصنة الانترنيت بالإنجليزية
مقدم من طرف منتديات العندليب

السلام عليكم

أريد بحث حول القرصنة الانترنيت بالإنجليزية

يكون كامل في ملف وورد

أرجو الرد في محتاجوا




>>>>> ردود الأعضـــــــــــــــــــاء على الموضوع <<<<<
==================================

>>>> الرد الأول :

اتقصد الهاكر؟؟؟؟؟؟؟؟؟؟؟

=========


>>>> الرد الثاني :

نعم يا أخي

=========


>>>> الرد الثالث :

Hacker generally a word describing the skilled team of specialist skills in the field of computer and information security. The word hacker essentially fired on a group of smart programmers who unite the different systems and try to penetrate, and not necessarily to be in the intention to commit a crime or even a misdemeanor, but their success in the penetration is a success to their abilities and skills. However, the law deemed intruders managed to enter the place is not where they should be. And to do this process is optional tested the abilities programmed without knowing his real name or announce himself. But some of them are exploited by criminal sabotage to clear the information and others are commercially exploited for the purposes of espionage and to steal some money.
Here and found a lot of companies like Microsoft need to protect their systems and found that the best method is to set the salaries of high Hola ******* trying to penetrate their mission and their various places to find weaknesses and propose the needed protection. In this case began a hacker to gain a lot of pros. However, the main one is named. The word has become a programmer, a hacker known as special abilities used in the right as it can be used in error.

Contributed to computer ******* or ******* in the design of the structure and techniques of the Internet, and are still doing a lot of efforts to improve the structure of networks and the development of technologies used in networking. Possible breakdown of some of the functions of computer pirates:
Detect the defects of security information, and view the solutions to them and thus protection from user passive.
To the completion of open source projects, and view for free on the Internet, such as the Linux operating system.
To modify the scripts on web sites and develop them.
To provide security consulting for major companies such as Microsoft.
Help the security authorities of the States to control the abuse of technology.

Listen: sensing and take the data from the network via so-called sniffer programs that record everything that goes on between computers.
Social Engineering Social Engineering: Method impersonate serve the hacker to get the information required for the storm where it is to persuade the person to be taking information from the hacker friend or the like, or one of individuals who are entitled to access to information, to pay to the disclosure of information that has and needed by the hacker.
War driving fact-wireless networks: Search by ******** on the existence of wireless networks, usually walking around the hacker drive between the regions in search of Wi-Fi networks or hot spot where the exploitation of data shared between users of the networks and gaps in the devices connected to the enable the hacker to penetrate.
"The ******* often programmers or engineers, networks or individuals familiar with the very technology and carry out piracy through the use of certain devices, is in a few cases, either the possibility of hacking the true become one of the skill of the hacker and intelligence Ripper so that it reveals gaps in Web sites, software, and is not permanent that the aim of FFA is a hacker vandalism in most cases the goal is to demonstrate the strength and ability to defeat the defenses of the site, which means that the hacker was able to defeat the site designers and developers "- hacker current -
How penetrates hacker sites

Are the rules of engagement through stages two pillars: the collection of information as your IP address followed by the server's parents includes the target site and collect the names of Alskraptat vehicle on site for inspection by Ada where gaps code (Mistakes programmer Alskrapt) and this topic errors or gaps allow a hacker to do a few things are forbidden. Attack, a phase is the exploitation of loopholes and Alostglalat often in the form of links. Hacker who shall enter the Admin Control Panel or the application of the command on the server or upload malicious files Kalshl (Skraept used by malicious *******)


=========


>>>> الرد الرابع :

المشاركة الأصلية كتبت بواسطة amor02
نعم يا أخي

انا فتاة ولست فتى

=========


>>>> الرد الخامس :


=========