Vous êtes sur la page 1sur 5

Hacktivism is the use of computers and computer networks as a means of protest to promote political ends.

. If hacking as "illegally breaking into computers" is assumed, then hacktivism could be defined as "the use of legal and/or illegal digital tools in pursuit of political ends". These tools include web site defacements, redirects, denial-of-service attacks, information theft, web site parodies, typosquatting and virtual sabotage.

URL Hijacking Also called "typosquatting," it refers to taking advantage of common typos users make when entering a Web address (URL) into their browser. A domain name that is a misspelled version of a popular domain name is legally registered. Whenever someone misspells the URL, the site is accessed, which may offer a competitive product, an entirely different product, a pile of ads or be a soapbox for a cause.

Page Hijacking 1. Refers to numerous ways in which a user is covertly (secretly) redirected to a different Web site. For example, "home page" hijacking refers to changing the default address of the home page in the user's browser. When the browser is launched, it goes to that Web page. o "Browser hijacking" also refers to changing the home page as well as adding shortcuts to the Favorites menu or lowering security settings. These changes can be made using JavaScript or an ActiveX module. o Another form of page hijacking is copying a popular Web page from its original site to a third-party site so that it becomes indexed by search engines. After the links have been established, the content of the page is changed to reflect its real purpose, or it may redirect the user to a different site 2. Stealing the source code of an attractive page from one site and using it on another with slight modifications.

Web Filter A Web filter is a program that can screen an incoming Web page to determine whether some or all of it should not be displayed to the user. The filter checks the origin or content of a Web page against a set of rules provided by company or person who has installed the Web filter. A Web filter allows an enterprise or individual user to block out pages from Web sites that are likely to include objectionable advertising, pornographic content, spyware, viruses, and other objectionable content.

Types Of Viruses Trojan Horse: A Trojan is another type of malware named after the wooden horse the Greeks used to infiltrate Troy. It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files, stealing data, or activating and spreading other malware, such as viruses). Trojans are also known to create back doors to give malicious users access to the system. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they selfreplicate. Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet. Worms: Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. To spread, worms either exploit a vulnerability on the target system or use some kind of social engineering to trick users into executing them. A worm enters a computer through a vulnerability in the system and takes advantage of file-transport or informationtransport features on the system, allowing it to travel unaided. Bootsector Virus: A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks. Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes. Rootkit Virus: A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files.

Polymorphic Viruses: A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect.

Logic Bombs/Time Bombs: These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.

Types of Software 1. Operating System 2. Application Software

Pretexting Pretexting is the practice of obtaining someone's personal information under false pretenses, and it is against federal law.

Telecommuting Work from home, communicating with the workplace using equipment such as telephones, fax machines, and modems.

Audit Trail A record showing who has accessed a computer system and what operations he or she has performed during a given period of time. Audit trails are useful both for maintaining security and for recovering lost transactions.

Fair Use In its most general sense, a fair use is any copying of copyrighted material done for a limited and transformative purpose, such as to comment upon, criticize, or parody a copyrighted work. Such uses can be done without permission from the copyright owner. In other words, fair use is a defense against a claim of copyright infringement. If your use qualifies as a fair use, then it would not be considered an illegal infringement. So what is a transformative use? If this definition seems ambiguous or vague, be aware that millions of dollars in legal fees have been spent attempting to define what qualifies as a fair use. There are no hardand-fast rules, only general rules and varied court decisions, because the judges and lawmakers who

created the fair use exception did not want to limit its definition. Like free speech, they wanted it to have an expansive meaning that could be open to interpretation. Most fair use analysis falls into two categories: (1) commentary and criticism, or (2) parody.

Commentary and Criticism If you are commenting upon or critiquing a copyrighted work -- for instance, writing a book review -- fair use principles allow you to reproduce some of the work to achieve your purposes. Some examples of commentary and criticism include:

quoting a few lines from a Bob Dylan song in a music review summarizing and quoting from a medical article on prostate cancer in a news report copying a few paragraphs from a news article for use by a teacher or student in a lesson, or copying a portion of a Sports Illustrated magazine article for use in a related court case.

The underlying rationale of this rule is that the public reaps benefits from your review, which is enhanced by including some of the copyrighted material. Additional examples of commentary or criticism are provided in the examples of fair use cases.

Parody A parody is a work that ridicules (or mock) another, usually well-known work, by imitating it in a comic way.

Script Kiddies In hacker culture a script kiddie or skiddie, (also known as skid, script bunny, script kitty) are unskilled individuals who use scripts or programs developed by others to attack computer systems and networks and deface websites. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated hacking programs or exploits on their own, and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.

Zombies Zombie computers are computers that have been taken over by a hacker without the knowledge of the owner. A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction.

Luddites A Luddite is a person who fears or hates technology, especially technological devices that threaten existing jobs or interfere with personal privacy.

Vous aimerez peut-être aussi