hackapps book hack proofing your web applications phần 2

Một vấn đề lớn với ký mã là bạn phải dựa vào một bên thứ ba để kiểm tra tính xác thực. Nếu một lập trình viên cung cấp thông tin giả để CA hoặc đã đánh cắp danh tính của một cá nhân hoặc công ty, | Hacking Methodology Chapter 1 35 Summary Hacking has evolved over a period of time. Many of the now infamous hackers such as Cap n Crunch started out by breaking into the phone lines of Ma started out as interest and curiosity was in reality an early form of hacking. Computer hacking really took off with the introduction of ARPANET personal computers and then the Internet. Advancements in technology have a direct correlation to challenges posed by the hacking community. The term hacker is one that has numerous meanings depending on what one s perceptions are and whether the name is self-ascribed. The key difference that we should be aware of is the difference between a malicious hacker and an ethical hacker. A malicious hacker hacks with the intent to find a vulnerability and then exploit that vulnerability. More ethical hackers may choose to disclose the vulnerabilities that they find to the appropriate most often motivates a hacker is the challenge to find a hole exploitable code or a breach in security that nobody else has found method of an attack is as varied as the reasons for them but the ones that we are all more familiar with are the DDoS attacks virus attacks and worm attacks attacks more directly avoidable by developers include buffer overflow attacks cookie poisoning and cross-site scripting. Hiring a security professional whether contract or full-time network-oriented or development-oriented is a step in the right direction towards serious defense. Prior to bringing someone on board there has to be an understanding of what the security professional s role will be there should be a good security plan in place and there should be regularly scheduled review meetings to ensure that the goals are being met with consistency. 36 Chapter 1 Hacking Methodology Solutions Fast Track A Brief History of Hacking 0 In the 1960s it was the ARPANET the first transcontinental computer network which truly brought hackers .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.