English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

how you see a hacker just look at some access screen then just type something and override it . How does he know what language to use ? And why would the access screen let you input ANYTHING other than the password ? Do all protection programs allow a user interface other than the space for entering a password or identity phrase ? Is making a computer that was programmed by someone else do what you want so easy ? Do they use access language or machine language ?

2007-10-03 11:20:59 · 12 answers · asked by proteusmirabilus 4 in Computers & Internet Security

12 answers

To learn hacking, you either need to buy professional video or watch some video clips from YouTube.

Or..

Go to college and take a course in Informational Technology or Computer Science. Then take the degree and get a certification in Ethical Hacker and Advance Ethical Hacker plus some other security certification.

2007-10-03 11:24:40 · answer #1 · answered by Anonymous · 1 0

The only time that any of those movies have been close to the truth have been one of two types.

A) the hacker looks around tries the most common passwords. The top 10 common passwords, or something visible like the make of the monitor in front of him, or looking at pictures on the desk and putting in wifes name or birthday. The one most common thing Ive never seen them do is lift the keyboard and look underneath it.

B) or they know the software. Many have a "backdoor" or override password that the programmer can use to fix problems (usually thats only big systems where the programmer is still maintaining everything) OR they know the default standard password that the program came with and many people dont bother changing

2007-10-05 07:14:59 · answer #2 · answered by Gandalf Parker 7 · 1 0

Usually real hacking is done with a lennox machine and keyboard (since this is already set up to input the necessary codes accepted by ip servers) Various periferals (and underground software) can be utilized for quick hook-up or modifications. The secret is no secret. It is a matter of understanding how the internet and coding is used to connect with the information desired. Anyone with an IQ>125 and 5 years experience could possibly do this..

2007-10-03 11:32:23 · answer #3 · answered by Anonymous · 1 0

Of course it isn't that easy, which is why it's Hollywood "magic," ie. cutting corners. Watch the movie Hackers some time, for a crash course in silliness. Very few movies actually get it right. The better ones at least have them using code crackers that syphon through potential combinations thousands of times faster than a person could by himself.

Good rule of thumb: take anything you see in a film with a grain of salt.

2007-10-03 11:25:40 · answer #4 · answered by damlovash 6 · 0 0

the movies are fake. real life takes a lot of time and trial and error, and sometimes the hacker is just an inside job guy.

but the most simple hacking is called brute force, where the computer tries every single combination of letters/numbers there is. this can be narrowed down if you already know part of the password.

2007-10-03 11:25:40 · answer #5 · answered by Luke V 3 · 0 0

Hackers Also James Bond's Goldeneye has a few hacking scenes in it.

2016-04-07 02:27:43 · answer #6 · answered by ? 4 · 0 0

haha - I know what you mean...I've decided that most of the so-called computer hacking we see on the movies is just plain hokey!

I think that when a real hacker hacks into a computer he maybe...goes through the startup. He/she installs software that launches on startup which gives him an interface to make changes...??

This is just my theory based on how computers work. I've never hacked a thing in my life (obviously)- never even crossed my mind...!

2007-10-03 11:29:41 · answer #7 · answered by jeristhin 3 · 0 0

I think it's very hard to do that, I'm a software developer, I do all kinds of software, and somethings for sure, theres always a bug in it, so I think they just figure out what kind of a bug could it be; also, if you use the machine language (10101010), you can do whatever you want

2007-10-03 11:26:04 · answer #8 · answered by Fede 2 · 0 0

This is a way to spot the hacker.With advanced techology.
But if you dont have the tools there is no way

2007-10-03 11:23:29 · answer #9 · answered by LuvNatalie 3 · 0 0

a LOT of it has to do with the movies.

hacking is not that easy.

dont believe everything you see in the movies.

2007-10-03 11:25:35 · answer #10 · answered by Josh B 5 · 0 0

fedest.com, questions and answers