Blog is under Construction!

Hacking 4 fun is back this time ,Coming soon with the new ,ultimate and great hacking style!This time we gonna enjoy and love this much more than before.until then like this page on facebook

Info-Tech

Thanks 4 your co-operation.

You are the back-bone of Hacking 4 fun.

your's sincerly

Asad Raza


Like Us

U there


Wednesday, August 26, 2009

CursorFX


Create and use mouse cursors that look and feel far superior to anything you've ever seen before!

Saturday, August 15, 2009

Hacking Level

Hacking 4 fun™ followers(Hacking Level):-


Other's followers (Hacking Level):-




Sunday, August 9, 2009

Hacker's Types

Hackers can be divided into three groups: white hats, black hats, and grey hats. Ethical hackers
usually fall into the white-hat category, but sometimes they’re former grey hats who have become
security professionals and who use their skills in an ethical manner.

White Hat:-


White Hats are the good guys, the ethical hackers who use their hacking skills for
defensive purposes. White-hat hackers ar
e usually security professionals with knowledge of
hacking and the hacker toolset and who use this knowledge to locate weaknesses and implement
countermeasures.

Black Hat:-


Black hats are the bad guys: the malicious hackers or
crackers
who use their skills
for illegal or malicious purposes. They break into or otherwise violate the system integrity of
remote machines, with malicious intent. Having gained unauthorized access, black-hat hackers
destroy vital data, deny legitimate users service, and basically cause problems for their targets.
Black-hat hackers and crackers can easily be differentiated from white-hat hackers because their
actions are malicious.

Grey Hat:-


Grey hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker. Both are powerful forces on the Internet,
and both will remain permanently. And some individuals qualify for both categories. The
existence of such individuals further clouds the division between these two groups of people.
In addition to these groups, there are self-proclaimed ethical hackers, who are interested in
hacker tools mostly from a curiosity standpoint. They may want to highlight security problems
in a system or educate victims so they secure their systems properly. These hackers are
doing their “victims” a favor. For instance, if a weakness is discovered in a service offered by
an investment bank, the hacker is doing the bank a favor by giving the bank a chance to rectify
the vulnerability.



 
Copyright © 2009 Hacking 4 fun™.All right reserved.