Saturday, 26 May 2012

>>>>>Time To Know Work With Linux Key Logger<<<<<


LKL is one of the best key-logger for Linux Operating system as well.

# Let know how to work with lkl in Ubuntu  :-
1.Install LKL from site this will be by the name "lkl-0.1.1.tar.gz".
   Now after downloading follow the path  :
2.Now Open your Terminal &  Type

   ->:~/$ cd Downloads <Enter>
   ->:~/Downloads$ tar -zxvf lkl-0.1.1.tar.gz <Enter>
   ->:~/Downloads$ cd lkl <Enter>
   ->:~/Downloads/lkl$ sudo su (Then give the system password)
   ->:~/Downloads/lkl# ./configure <Enter>
   ->~/Downloads/lkl# make install <Enter>
   ->~/Downloads/lkl# ./lkl -l -k keymaps/me_km -o /home/vidya<here you will     put your system name>/Documents/klog.txt <Enter>

Now you will get a Key-logger start-up massage. Open your browser & enjoy with lkl. Let this terminal Open till you want to work with Key-logger otherwise Press "ctrl+c" , and come out from the process. And exit the Terminal. To work with lkl  just repeat last one command for process, But remember next time change the file name. I hope this post will help you. Have a good day.


You can download  LKL from here.
http://sourceforge.net/projects/lkl/

Thanks :)

Wednesday, 7 March 2012


Let's Know About Ethical Hacker & Hacking !!

----------Required in a Ethical Hacker--------------
1.Operating System Knowledge
2.Network Knowledge
3.Cyber Space Knowledge
4.Security Knowledge
5.Technical Knowledge
--------------------------------------------------------

----------------------------Summary--------------------------------------------------------
Computer hacking is the practice of altering computer hardware and software to
carry out a goal outside of the creator‘s original intention.
People who slot in computer hacking actions and activities
are often entitled as hackers.The majority of people assume
that hackers are computer criminals. They fall short to identify
the fact that criminals and hackers are two entirely unrelated
things. Media is liable for this. Hackers in realism are good and
extremely intelligent people, who by using their knowledge in a
constructive mode help organisations, companies, government, etc.
To secure credentials and secret information on the Internet. Years
ago,no one had to worry about Crackers breaking into their computer
and installing Trojan viruses, or using your computer to send attacks
against others. Now that thing have changed, it's best to be aware of
how to defend your computer from damaging intrusions and prevent
black hat hackers. Rampant hacking is systematically victimising
computers around the world. This hacking is not only common,
but is being executed without a flaw that the attackers compromise
a system, steal everything of value and entirely rub out their pathway within 20 minutes.
------------------------------------------------------------------------------------------------

-------------------------Types of Hackers----------------------------------------
->Black Hat Hackers:-
Black hat hackers
are the cyber criminals who are
responsible for all illegal activities going
on there in cyber space mostly.
Black Hat hackers are not kids they are
highly trained cyber professionals which
having vast knowledge about computer
systems.
They have knowledge about all popular
operating systems and computer
languages so they are capable of
exploiting almost any machine on any
operating system.

->White Hat Hackers:
White hat hackers
are kind of cyber cops kind of hackers
who have the responsibilities to protect
the computer and cyber space from
black hat hackers.
They are having the same knowledge
level as the black hat but the only
difference they are having is the
mentality level, they put their
knowledge not in destruction but in
protection hence are the much popular
and respected cyber professional
available in the cyber space.

->Grey Hat Hackers:
Grey hat hacker as clears
from the name they falls in between the white
and black. They are half Angela and Half Devil
kind of hackers. They do not have much
knowledge about everything but the bit
knowledge they have is enough to perform
attacks according to the requirement.

->Script Kiddies:
Script Kiddies are the
cyber kids who do not have any
knowledge about hacking but they
learn according to the target, given by
some one or may be set by
themselves.
Here one thing we can not skip that
black hat-white hat are professional
hackers and when they perform
hacking they already know what will be
the result of what they are doing. But in
the case of script kiddies there is not a
single genuine reason behind hacking.
Reasons of script kiddies can be like
impressing his GF, revenge and etc.
------------------------------------------------------------------------------------

----------------------Scope In Ethical Hacking--------------------------
If you are an expert in computers and decode a programme without much effort
give a thought to working with a Indian Government or a multinational company
to secure their websites from Cyber Attacks. As Internet Hacking has in recent
year become a common occurrence, nervous Government agencies and corporate
are seeking Ethical Hackers in large numbers to secure critical data's thus opening
the lucrative career opportunity for youngsters in the field of Ethical Hacking.
As IT Minister Kapil Sibal says:-We Need A Community Of Ethical Hackers.

Vidya Gupta :)