Archive for the ‘Computer Hacking and Cracking basics’ Category

    Student Charged With Hacking School’s Grade System

    Max ReadStudent Charged With Hacking School's  Grade SystemThis is Tyler Coyner, a student at the University of Nevada in Reno and a technology entrepreneur. His business? Allegedly, hacking into his former high school’s computer grading system and changing students’ grades for money.

    Coyner has been arrested and charged with “conspiracy, theft and computer intrusion,” along with 13 other students who were apparently working with him. The details of the “hacking” are sketchy—PC World says he “somehow obtained a password,” which could involve almost anything—but the best part of the story isn’t about his tech exploits:

    Coyner boosted the grades of a dozen students but saved the biggest improvements for himself, police said. He was selected as his school’s salutatorian at the 2010 graduation, an honor he never legitimately earned, according to the Nye County Sheriff’s Office. The salutatorian honor is usually given to the student with the second-highest marks at graduation.

    Coyner, now a student at the University of Nevada in Reno, had a 4.54 grade point average, according to a profile of him in the Pahrump Valley Times, written around the time of his graduation last year.



    December 14, 2010 | By Paul Mauldin

    Here’s a frightening scenario – thousands of teenage hackers sitting in their rooms after school trying to break into utility databases or spread a virus – all through the Home Area Network (HAN)! Could it happen? Recent events are certain to make the power industry sit up and blink.

    We could call the last few months the Semester of Cyber-security panic. As the WikiLeaks fiasco continues to boil, herds of hackers are apparently engaged in a global cyber-war against nations and corporations that threaten WikiLeak’s continued operations. There doesn’t seem to be any real moral or patriotic issues involved in the attacks. It’s almost as though a globally connected bunch of teenaged hackers just took on a new challenge. Sort of a “Revenge of the Nerds” cyber sequel. In fact, at the time of this writing a Dutch teenager is being held as a suspected ringleader of the “Operation Payback” attacks on financial institutions that refuse to service WikiLeaks donations.

    All that bizarre chaos will go where it will – but the big question is: How did so much info get acquired through one entry point? It’s hard to believe that a young soldier might have done something as simple as plugging into a USB port and downloading over 6 million documents.

    Then there’s STUXNET, the cyber virus that entered via the Internet and infected Iran’s uranium processing center in Natanz and their new nuclear reactor in Bashehr. The STUXNET worm specifically targets certain Siemens control systems used in power plants and in the power grid itself. Apparently it was a targeted infection intended to show off the virus’ capabilities. So far the virus hasn’t caused much damage. But it could have, with the right payload.

    The biggest problem is getting rid of the darn thing. Ralph Langner, a German cyber security expert on STUXNET, describes the Iranian’s conundrum:

    “They should throw out every personal computer involved with the nuclear program and start over, but they can’t do that. Moreover, they are completely dependent on outside companies for the construction and maintenance of their nuclear facilities. They should throw out their computers as well. But they can’t,” he explained. “They will just continually re-infect themselves.” Sort of like a bubonic plague epidemic without antibiotics.

    Apparently the virus came in through the internet and, just like the WikiLeaks gusher, it only takes one open cyber door. You can bet we’ll keep that in mind when considering Smart Grid vulnerabilities.

    In any case it looks like smart grid security is headed to be more complex and exacting than we had considered. We’ll see more than a few state and federal agencies involved so we can only hope that the solutions won’t be so user-unfriendly that they make the customer interface useless.


    Black Hat

    Posted: November 29, 2010 in Computer Hacking and Cracking basics

    in contrast, the black hat hacker is considered a criminal and uses his/her skills to break the law

    White Hat

    Posted: November 29, 2010 in Computer Hacking and Cracking basics

    considered one of nice guys, a white hat hacker is one who hacks and the informs the owner of the hacking

    Hacking run

    Posted: November 29, 2010 in Computer Hacking and Cracking basics

    essentially, a hacking run is a hacking session that lasts longer than normal working times, i.e. a hacking run that lasts for in excess of eight to ten hours.

    To know what is computer hacking, one must know their terms. A list of certain significant ones is described below.