hahahah amol hacked ur ip address

Sign by Danasoft - For Backgrounds and Layouts

Author

Amol Bhure (ultra l33t) was born in Maharashtra, Seventh July Of Nineteen Hundred Nineteen Ninety A.D. He's currently pursuing his B.E in Bangalore. A cyber Security Professional, Hacker, Designer, Programmer. Keen interest in hacking and network security and he developed several techniques of defending and defacing websites. He's of the opinion that people should learn this art to prevent any cyber attacks. Currently Amol works as a member of 'Null International', Bangalore chapter as a network security guy. Apart from this, he has done internships at YAHOO! India, AMAZON India, etc. He has also attended various International conferences like NullCon GOA, c0c0n, ClubHack, Defcon , SecurityByte, ICFoCS, OWASP, etc.. He is certified with RHCE, LPT, CEH v7, SCJP, AFCEH. In programming he knows stuffs on C, C++, C# , JAVA (SCJP), .NET , and PHP. Additionally he knows few hardware languages like HDL, VHDL, Verilog, Embedded Micro controller Programming. He has been featured on google hall of fame. Amol was named a "India's top 10 hacker" by google. "World's top 50 hacking blog" by google.

Daily Page Views

Sunday, December 5, 2010

Hacktivism Vs Terrorism

Hacktivism Vs Terrorism

Hacktivism is the act of hacking, or breaking into a computer system, for a politically, socially or motivated by a criminal purpose. The intentions behind hacking are nothing but to harm and damage. The individual who performs an act of hacktivism is said to be a hacktivist. There are many such scavengers are around who never forget to boast their skills of hactivism. Globally there are 4,00000 community of black hat hackers, out of which 70 percent are students and between the age group of 20 to 25, 18 percent are between the age group of 15 to 20, 2percent are above the age of 30, 10 percent are grey hat hackers. And this population is of hactivists. (Read this beautiful research report in Cyber Terror) from this population 22% are only Indians,10 % from Pakistan ( details of these hactivists with pictures, code name, their addresses, and much more read in Cyber Terror)
A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site. Whether hacktivism is a crime may be debated. Opponents argue that hacktivism causes damage in a forum where there is already ample opportunity for freedom of speech. Others insist that such an act is the equivalent of a protest and is therefore protected as a form of free speech.  But in the recent past the best example of hactivism is nothing but the group of Injectors. Injectors are nothing but the black hat hackers, their intention are crood, motto is malicious and skills can be called as destructions on high profile level. But that does not mean all Injector are bad, the exploits should not be published or usage of exploits are always done for wrong reasons. I am not at all against inj3ct0rs. I regard them as most skillful and intelligent hackers. They not only penetrate in to your system or crash fire wall, they even crash your senses and penetrate your brains if you dare to go against them voicing your opinion. They are the powerful mafias and one should be even willing to lose life, because they can get your death near to you by harming physically or mentally.( One of the Hactvist from Pakistan threatened me saying he will create blogs to display my nude pictures on it. I just requested him saying use some good model’s body because I always had fantasy to look in shape with good curves on body. So dear readers if you come across any such blogs don’t forget only the face is mine but not the beautiful body below. This is another example of Hactivism)
Some people describing themselves as hacktivists have taken to defacing websites for political reasons, such as attacking and defacing government websites as well as web sites of groups who oppose their ideology. Within the hacking community, those who carry out automated attacks are generally known as script kiddies. Capacity for solo activity - while most forms of political activism require the strength of masses, hacktivism is most often the result of the power of one, or small group. Is most often carried out anonymously, and can take place over transnational borders.  Critics suggest that DoS attacks are an attack on free speech; that they have unintended consequences; that they waste resources; and that they could lead to a "DoS war" which nobody will win. In 2006, Blue Security attempted to automate a DoS attack against spammers; this led to a massive DoS attack against Blue Security which knocked them, their old ISP and their DNS provider off the internet, destroying their business.

Depending on who is using the term, hacktivism can be a politically constructive form of anarchist civil disobedience or an undefined anti-systemical gesture; it can signal anticapitalist or political protest; it can denote anti-spam activists, security experts, or open source advocates. Critics of hacktivism fear that the lack of a clear agenda makes it a politically immature gesture, while those given to conspiracy theory hope to see in hacktivism an attempt to precipitate a crisis situation online. Hacktivism is a portmanteau [jargon] of hack and activism. This leads to a controversy of meaning because both the terms Hacker and Activism are both morally broad terms. Hacking has come to mean both "illegally breaking into computers" and "elegant computer programming". Activism similarly includes both explicitly non-violent action and violent revolutionary activities. which is assumed then hacktivism could be defined as "the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends". These tools include web site defacements, redirects, denial-of-service attacks, information theft, web site parodies, virtual sit-ins, virtual sabotage, and software development. It is often understood as the writing of code to promote political ideology - promoting expressive politics, free speech, human rights, or information ethics. Acts of hacktivism are carried out in the belief that proper use of code will be able to produce similar results to those produced by regular activism or civil disobedience. The recent example is hacking FaceBook like high profile social network. Hacktivismo is an offshoot of Cult of the Dead Cow; its beliefs include access to information as a basic human right, they are the loose network of programmers, artists and privacy in an era of increased technological surveillance.
Hacktivism is a controversial term, and can often be misconstrued as cyberterrorism. What separates hacktivism from cyberterrorism is a distinctly political or social cause behind the "haction". Some argue it was coined to describe how electronic direct action might work toward social change by combining programming skills with critical thinking. Others use it as practically synonymous with malicious, destructive acts that undermine the security of the Internet as a technical, economic, and political platform. But randomly speaking they are the actual threat and terrorist of cyber space. Recently we found prominent links between underworld mafias like D company and Chota Rajan gang and hactivists. They have one common motto … destroy. There is elaborated info about this in Cyber Terror.
The Department of Defense secures its systems using world-class information security standards and layered controls, thanks in large part to an abundance of financial resources. Conversely, corporations have limited security budgets and can be weakened by merger and acquisition activity.  Every leader, and every regime, and every movement, and every organization that steps across the line to terrorism must be banished from the discourse of civilized human life.

3 comments:

Anonymous said...
This comment has been removed by a blog administrator.
MiscSubs said...

Just FYI, the contents of your blog has been copied and published verbatim over here:
http://cyberterrors.blogspot.in/2010/11/hacktivism-vs-terrorism.html

There is no citation or a linkback to this post and moreover there is an open claim about the content being the author's own opinion.

jane holly said...

This professional hacker is absolutely reliable and I strongly recommend him for any type of hack you require. I know this because I have hired him severally for various hacks and he has never disappointed me nor any of my friends who have hired him too, he can help you with any of the following hacks:

-Phone hacks (remotely)
-Credit repair
-Bitcoin recovery (any cryptocurrency)
-Make money from home (USA only)
-Social media hacks
-Website hacks
-Erase criminal records (USA & Canada only)
-Grade change
-funds recovery

Email: onlineghosthacker247@ gmail .com