Monday 1 July 2013

// // Leave a Comment

What is Hacking and hashing

What is Hacking and hashing
Hacking:
Hacking is the process of seeking and exploiting weakness and loopholes in a computer system with either good intention or bad. If it's for a sinister purpose, it's called a cyber-crime while it's for a good reason it's called Ethical Hacking.Computer programming often use ethical hacking to test the reliability and security of existing system.However,certain groups of hackers perform malicious activities to gain access to personal and crucial information such as bank details.They're called Black Hat Hackers.Hacking can be done by Denail of service(DoS) attacks and inclusion of other malware. There are hacker conventions and magazines that focus on security and privacy of networks.Despite their socially sound intentions,Hacker group such as Anonymous indulge in computer crimes.Such groups are known as hacktivists. These days, hacking is a field of study as part of network security courses and is taught in many reputed universities.
Hashing:
Hashing a set of algorithms and methods that allow mapping of a set of varied length characters or strings to fixed length characters or integers.Hashing is essential to maintain data security and privacy in many circumstances.For example, Consider the social apps you see from your smartphone.These app try to access your contact list to find people who are already on that social app.Instead of uploading plain text contact details to their services which leads to a privacy breach, these apps hash the contact numbers and emails using hash keys only known to the app developers. These hashed contacts can then be compared to a user database of the app to find people you may know.This is just one application of hashing.Hashing is also used widely in Cryptography where a cryptography hash function is used. This is uses for password verification on various website. Although hashing is prominently used on client-side,hackers can still break the hash code and gain access to information however those are rare cases.

0 Peoples tell for us:

Post a Comment

Your feedback is always appreciated. We will try to reply to your queries as soon as time allows.
Note:
1. Make sure to click the "Subscribe By Email" link below the comment to be notified of follow up comments and replies.
2. Please "Do Not Spam" - Spam comments will be deleted immediately upon our review.
3. Please "Do Not Add Links" to the body of your comment as they will not be published.
4. Only "English" comments shall be approved.
5. If you have a problem check first the comments, maybe you will find the solution there.