Skip to main content

Posts

Basics of Network

Network: When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable the sharing of files and information between multiple systems. The Internet could be described as a global network of networks. Computer networks can be connected through cables, such as Ethernet cables or phone lines, or wirelessly, using wireless networking cards that send and receive data through the air. Types of Network: • LAN - Local Area Network • WLAN - Wireless Local Area Network • WAN - Wide Area Network • MAN - Metropolitan Area Network • SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network • CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network • PAN - Personal Area Network • DAN - Desk Area Network LAN and WAN were the original categories of area networks, while the others have gradually emerged over many years of technology evolution. LAN - Local Area Network A LAN

ethics and hacking 2

What they are?? •Ethics :  Moral principles that govern a person's or group's behaviour. •Hacking :  The practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. Hacking: How it all began?? •Been around for more than a century. •1960s – MIT’s artificial intelligence lab became staging grounds for hackers. •1970s – John Draper makes a long-distance call for free. •1980s – Kevin Mitnick, secretly monitors the e-mail of MCI and Digital Equipment security officials. •1990s – Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others. SINE IIT Bombay Why is security needed ?? •Information is a strategic resource. •A significant portion of the organizational budget is spent on managing information. •Have several security related objectives:  Confidentiality - keep info secret  Integrity - protect info accuracy  Availabilit

ethics and haking 1

1. A HISTORY OF HACKING Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. 1.1. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. 1.2. Early 1970s John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s. John Draper Yippie social movement starts YIPL/TAP (Youth Internatio