<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>LeArN To Be a HaCKeR</title><description>Being a hacker does not mean you have only knowledge, this is art to manage this knowledge in the right direction...
A real hacker does not boast of his skills, he proved them!</description><managingEditor>noreply@blogger.com (Unknown)</managingEditor><pubDate>Fri, 1 Nov 2024 03:34:02 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">9</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://hackers-time.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>The School For Hackers</copyright><itunes:keywords>hack,hacker,computer,computer,program,programs,teach,learn,lesson,virus,antivirus,connection,internet,net,worm,worms,tools,tool,fuck,free,comment,comments,bomber,bombers,privacy,Creativity,language</itunes:keywords><itunes:summary>How to become a hacker? Many people dream to be hackers. Some succeed while others do not ... What it takes to be a hacker? Knowledge, the ability to apply them, cunning, ingenuity and a little talent...&#13;
On the pages of this blog I will teach you of everything that you need to know to become a hacker.</itunes:summary><itunes:subtitle>LeArN To Be a HaCKeR </itunes:subtitle><itunes:category text="Technology"><itunes:category text="Software How-To"/></itunes:category><itunes:category text="Games &amp; Hobbies"><itunes:category text="Hobbies"/></itunes:category><itunes:category text="Technology"><itunes:category text="Podcasting"/></itunes:category><itunes:category text="Technology"><itunes:category text="Software How-To"/></itunes:category><itunes:category text="Sports &amp; Recreation"><itunes:category text="Professional"/></itunes:category><itunes:author>The Fire</itunes:author><itunes:owner><itunes:email>krem158@gmail.com</itunes:email><itunes:name>The Fire</itunes:name></itunes:owner><item><title>Part Three - Programs</title><link>http://hackers-time.blogspot.com/2010/12/now-you-know-some-of-viruses-and-their.html</link><pubDate>Thu, 16 Dec 2010 18:45:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5476492143620458399.post-2404523257950542496</guid><description>Now you know some of the viruses and their effects. To fuck someone's computer you can use some programs. To fuck someone's computer you can use some programs. Suitable for this purpose are programs to remotely access someone's computer. Most of them require installation on the computer of the victim, but there are those that do not require this. Programs like &lt;b&gt;&lt;span style="color: cyan;"&gt;Radmin&lt;/span&gt;&lt;/b&gt;, &lt;b&gt;&lt;span style="color: cyan;"&gt;VNC&lt;/span&gt;&lt;/b&gt;, &lt;b&gt;&lt;span style="color: cyan;"&gt;Beyond Remote Server / Client, TeamViewer&lt;/span&gt;&lt;/b&gt; and others require prior installation. This means that you have access to the computer of the victim or you need some way by which to lure someone to install this program. Examples like say that this is the best antivirus. Programs such as &lt;b&gt;&lt;span style="color: cyan;"&gt;NetTools&lt;/span&gt;&lt;/b&gt;, &lt;b style="color: cyan;"&gt;SuperScan&lt;/b&gt;, &lt;b&gt;&lt;span style="color: cyan;"&gt;Netscan&lt;/span&gt;&lt;/b&gt;, &lt;b&gt;&lt;span style="color: cyan;"&gt;AngryIP&lt;/span&gt;&lt;/b&gt; not require prior installation of the foreign computer. For them, you need only the IP address of the victim. Now you can to make everything with the computer. And there you can easily browse, or to delete,&amp;nbsp; or just to put a nice virus. To enter into someone's computer you can use the good old &lt;b style="color: white;"&gt;DOS&lt;/b&gt;. Choose from the Start Menu command &lt;span style="color: #f3f3f3;"&gt;RUN&lt;/span&gt; and type in the box &lt;b style="color: white;"&gt;TELNET&lt;/b&gt;. This will open a small DOS window. Here are some of the commands for &lt;span style="background-color: #444444; color: cyan;"&gt;Telnet&lt;/span&gt;:&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: cyan;"&gt;c&lt;/span&gt; – close&lt;br /&gt;
&lt;span style="color: cyan;"&gt;d &lt;/span&gt;– display&lt;br /&gt;
&lt;span style="color: cyan;"&gt;o&lt;/span&gt; – open (hostname or IP) and (port)&lt;br /&gt;
&lt;span style="color: cyan;"&gt;q&lt;/span&gt; – quit&lt;br /&gt;
&lt;span style="color: cyan;"&gt;set&lt;/span&gt; – set&lt;br /&gt;
&lt;span style="color: cyan;"&gt;sen&lt;/span&gt; – send&lt;br /&gt;
&lt;span style="color: cyan;"&gt;st&lt;/span&gt; – status&lt;br /&gt;
&lt;span style="color: cyan;"&gt;u&lt;/span&gt; – unset&lt;br /&gt;
&lt;span style="color: cyan;"&gt;escape&lt;/span&gt; - set the escape character&lt;br /&gt;
&lt;span style="color: cyan;"&gt;exit&lt;/span&gt; - exit the Telnet&lt;br /&gt;
&lt;span style="color: cyan;"&gt;localecho&lt;/span&gt; -&amp;nbsp; turn on local echo on the terminal&lt;br /&gt;
&lt;span style="color: cyan;"&gt;negotiate &lt;/span&gt;- the establishment of Telnet options&lt;br /&gt;
&lt;span style="color: cyan;"&gt;options &lt;/span&gt;- follow up of active options&lt;br /&gt;
&lt;span style="color: cyan;"&gt;quit&lt;/span&gt; - exit the Telnet&lt;br /&gt;
&lt;span style="color: cyan;"&gt;status&lt;/span&gt; - print status information&lt;br /&gt;
&lt;span style="color: cyan;"&gt;usecrnul&lt;/span&gt; - send CR-NUL and CR-LF as a newline&lt;br /&gt;
&lt;span style="color: cyan;"&gt;xon &lt;/span&gt;- local control the flow of symbols&lt;br /&gt;
&lt;span style="color: cyan;"&gt;z &lt;/span&gt;- interruption of Telnet session&lt;br /&gt;
&lt;span style="color: cyan;"&gt;?&lt;/span&gt; - print help information to Telnet&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: white;"&gt;Telnet for Unix&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
On Unix operating system Telnet service is part of system programs and additional installation is not required, and Telnet client is activated by:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
telnet [-d] [-a] [-n tracefile] [-e escapechar] [[-l user] host [port]]&lt;br /&gt;
&lt;br /&gt;
where the parameters of the command have the following meanings:&lt;br /&gt;
&lt;br /&gt;
host - IP address or symbolic name, machine name, seeking an outlet. This is the only mandatory parameter&lt;br /&gt;
&lt;span style="color: cyan;"&gt;-d&lt;/span&gt; - turn on debug information in exchange with host machine.&lt;br /&gt;
&lt;span style="color: cyan;"&gt;-a&lt;/span&gt; - automatic login in the host machine with the username used for the current user ID.&lt;br /&gt;
&lt;span style="color: cyan;"&gt;-n&lt;/span&gt; tracefile -record file of information tracing the relationship with host machine .&lt;br /&gt;
&lt;span style="color: cyan;"&gt;-e &lt;/span&gt;escapechar - down the escape character to terminate the relationship with the host machine.&lt;br /&gt;
&lt;span style="color: cyan;"&gt;-l&lt;/span&gt; user - set the username to connect to host machine. Replaces the option-l-a.&lt;br /&gt;
&lt;span style="color: cyan;"&gt;port&lt;/span&gt; - port number for the service of the service, if not specified is assumed 23.&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: lime;"&gt;&lt;span style="font-size: small;"&gt;&lt;b style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span class="" id="result_box" lang="en"&gt;&lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;In the next&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;lesson we&lt;/span&gt;`&lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;ll&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;talk about&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;how&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;to&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;hack the&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;password&lt;/span&gt;&lt;span title="Кликнете за алтернативни преводи"&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>krem158@gmail.com (The Fire)</author></item><item><title>Part Two - Video Lesson</title><link>http://hackers-time.blogspot.com/2010/12/part-two-video-lesson.html</link><pubDate>Thu, 16 Dec 2010 18:35:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5476492143620458399.post-8646341663371545657</guid><description>Once we met with viruses, let's move on to the next lesson.&lt;br /&gt;
To fuck someone's computer you can use different bombers or spammers. There are many variety of them. Another way is you to make small virus and to send it to the victim whit changing icon and file name of a game or a certain song.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.blogger.com/video.g?token=AD6v5dy6pWP4qAhm563C068xetRf9uh1lGIvtDVUSn1d2mpcC-pd-er62p7d-0eEVEQw_fkSNxjVSrM9cJp6tdj_dA' class='b-hbp-video b-uploaded' frameborder='0'&gt;&lt;/iframe&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;span class="" id="result_box" lang="en"&gt;&lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;To&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;send a&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;virus&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;to&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;someone and he do&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;not&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;recognize it&lt;/span&gt;&lt;span class="" title="Кликнете за алтернативни преводи"&gt;, you&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;can&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;attach it&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;to&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;any&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;photo&lt;/span&gt;&lt;span class="" title="Кликнете за алтернативни преводи"&gt;,&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;game&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;or&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;otherwise&lt;/span&gt;&lt;span class="" title="Кликнете за алтернативни преводи"&gt;.&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;For&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;this purpose&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;you&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;can&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;use&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;programs&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;such as&lt;/span&gt; &lt;span class="hps" title="Кликнете за алтернативни преводи"&gt;&lt;span style="color: white;"&gt;Joiner&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>krem158@gmail.com (The Fire)</author></item><item><title>Viruses and Worms</title><link>http://hackers-time.blogspot.com/2010/11/viruses-and-worms.html</link><pubDate>Tue, 9 Nov 2010 13:15:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5476492143620458399.post-7977571212856129278</guid><description>In this section, you will meet only part of the viruses and worms. If someone wants to add a comment or question, let's do it in the comments after the article.&lt;br /&gt;
An old and nice virus is &lt;b style="color: cyan;"&gt;CIH&lt;/b&gt;. It hack the entire computer and BIOS. Its disadvantage is that it grabs all antivirus programs.&lt;b&gt;&lt;span style="color: red;"&gt; &lt;span style="color: cyan;"&gt;Blaster&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; reboot constantly. &lt;b style="color: red;"&gt;&lt;span style="color: cyan;"&gt;Cmoskill&lt;/span&gt; &lt;/b&gt;takes the control of the computer and it is crazy. Before you must to make adjustments to it and then gives the victim. &lt;b style="color: cyan;"&gt;Melissa&lt;/b&gt; is a network virus and spreads like an epidemic, causing much damage. &lt;b style="color: cyan;"&gt;T-virus&lt;/b&gt;&lt;span style="color: cyan;"&gt; &lt;/span&gt;helps you to create a small&lt;span style="color: #444444;"&gt; &lt;/span&gt;&lt;i style="color: white;"&gt;&lt;b&gt;.bat virus&lt;/b&gt;&lt;/i&gt;. They are not caught by antivirus programs.&lt;span style="color: cyan;"&gt; &lt;/span&gt;&lt;b style="color: red;"&gt;&lt;span style="color: cyan;"&gt;Parrot&lt;/span&gt; &lt;/b&gt;is win32 EXE virus writen in Win32 ASM file. &lt;b style="color: cyan;"&gt;HDFLL&lt;/b&gt; - hard to grasp by antivirus programs. Its full the computer with hard DLL files in which there are random numbers Dock entire hard not finished.&lt;b style="color: red;"&gt; &lt;span style="color: cyan;"&gt;Just Me&lt;/span&gt;&lt;/b&gt; this is my favorite. Not caught by antivirus programs! Deletes everything from Windows. It is very useful because of its rapid action. &lt;b style="color: cyan;"&gt;Barrotes&lt;/b&gt; this is the first known Spanish virus appeared in 1993, once uploaded to your computer, it remains hidden until the date 5 January, when activated showing a series of features resembling the grating on the monitor. Cascade or Falling Letters. Established in Germany in 1997, this virus displays the screen "waterfall" of drop points every time you infect the computer. &lt;b style="color: cyan;"&gt;ILoveYou or Loveletter&lt;/b&gt; - So famous that it hardly needs no introduction, this "romantic" virus out of the Philippines in 2000 with its title "I LOVE YOU", he easily draws attention to itself and thus infect millions of computers around svyatNimda. The name is actually the word "admin" (administrator), written on the back. The link is the possibility of this type worm creates administrative rights on already infected computers. &lt;b&gt;&lt;span style="color: red;"&gt;&lt;span style="color: cyan;"&gt;Nimda&lt;/span&gt; &lt;/span&gt;&lt;/b&gt;was established in China on 18 September 2001. &lt;b style="color: cyan;"&gt;SQLSlammer&lt;/b&gt; - This is another type of worm that caused quite a headache for many companies around the world. Appeared for the first time on January 25, 2003, the worm affects more than half a million servers a few days. &lt;b style="color: cyan;"&gt;Sobig&lt;/b&gt; this German virus appeared in the summer of 2003 of options under which spread throughout the network, the most dangerous is Sobig.F, launched their attack on August 19, using email and affecting a total of 1 million computers. &lt;b style="color: cyan;"&gt;Netsky&lt;/b&gt; is malicious code launched by Germany in 2004, exploits a vulnerability in Internet Explorer. Its creator is actually responsible for other known virus - &lt;b style="color: cyan;"&gt;Sasser&lt;/b&gt;. Infecting a computer with a &lt;b style="color: cyan;"&gt;Backdoor Trojan &lt;/b&gt;is one way a hacker to take over control of computer to another user over the Internet without his permission. &lt;b style="color: cyan;"&gt;NetBus&lt;/b&gt; is a bit old, but at the expense of this is very nice, fast, funny worm. &lt;b style="color: cyan;"&gt;SubSeven&lt;/b&gt; has many features. What makes him so good is malkoyat size &lt;i style="color: white;"&gt;&lt;b&gt;server.exe&lt;/b&gt;&lt;/i&gt;. &lt;b&gt;&lt;span style="color: red;"&gt;&lt;span style="color: cyan;"&gt;BackOffice&lt;/span&gt; &lt;/span&gt;&lt;/b&gt;has all important functions. Its disadvantage is that it wants installed. &lt;b style="color: cyan;"&gt;Lamespy&lt;/b&gt; is a typical trojan. Medium size, has won all features midsize server and good interface. &lt;b style="color: cyan;"&gt;GIP&lt;/b&gt; did not differ much from the top. Its advantage is that keep detailed log files and sends them to your inbox.&lt;span style="color: cyan;"&gt; &lt;/span&gt;&lt;b style="color: cyan;"&gt;Osiris Trojan&lt;/b&gt; is with many features. Designed primarily for monitoring ICQ to victim.&lt;span style="color: cyan;"&gt; &lt;/span&gt;&lt;b style="color: cyan;"&gt;Conficker&lt;/b&gt; is the last on the list but not the significance of the damage caused, Conficker appeared in November 2008.&lt;br /&gt;
&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title=""&gt;The programs type &lt;span style="color: cyan;"&gt;Joiner&lt;/span&gt; are very suitable if you want to disguise a virus and to suggest the victim such as a picture.&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>krem158@gmail.com (The Fire)</author></item><item><title>Part One - Viruses</title><link>http://hackers-time.blogspot.com/2010/11/part-one-viruses.html</link><pubDate>Thu, 4 Nov 2010 14:15:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5476492143620458399.post-6585036683897807803</guid><description>The Viruses are most often small programs written for distribution and destruction of computer systems. The Viruses most often attach code to other files and thus infect them, make their copies and thus repeatable. The viruses most often infect executable files. &lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;Types of viruses&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
1. &lt;b&gt;Polymorphic viruses&lt;/b&gt; - viruses that are extremely difficult to detect because they constantly change their code. It is known that no two identical code polymorphic viruses. Such a virus can make its thousands of modifications to protect th antivirus software. Each new copy of these viruses is encoded differently. &lt;br /&gt;
2. &lt;b&gt;Macro viruses&lt;/b&gt; - that are among the most common viruses. This is because their creation is a breeze. Distribution is also supported by the fact that they are most commonly distributed with programs that are installed on each PC that is Microsoft Office. &lt;br /&gt;
3. &lt;b&gt;Stealth viruses&lt;/b&gt; - these are the most dangerous viruses because they are made so that their discovery is really hard. - Some of these viruses infect the computer system and later spread to infect new systems. - Almost always code of stealth viruses is algorithmic locked by Da altered by any multiplication of the virus code. Most viruses are resident protection technique by which to protect themselves. - These viruses are extremely difficult to clean and detection in many cases forcing antivirus scan report that detected no viral infection. They showed no difference in file size and mark the sectors themselves in memory as mechanically damaged and thus their scan is skipped. &lt;br /&gt;
4. &lt;b&gt;Resident viruses&lt;/b&gt; - when such a virus is loaded into the system remains r3ezidenten to shutdown. This is done through the functions of the operating system or BIOS-a. These viruses are very common and infect very many systems .. &lt;br /&gt;
5. &lt;b&gt;File viruses&lt;/b&gt; - viruses that infect executable files or files with some information as the goal is to be loaded with the file itself and thereby gain access to the resources of the infected system. &lt;br /&gt;
6. &lt;b&gt;Boot sector viruses&lt;/b&gt; - such viruses are activated when the system loader then read boot sector from external memory and execute it. When you try to access a conventional boot sector often apply stealth techniques and the operation was transferred to pre-preserved original boot record. Fall to boot and viruses of type Partition table (MBR) viruses. Distributed only in hard disks. &lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;i&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;i&gt;&lt;b&gt;Virus programs:&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
1.&lt;b&gt;Worm (worm)&lt;/b&gt; - as opposed to viruses, computer worms are malicious programs that replicate themselves from one system to another, instead of infecting files located in your computer. - Mass mailing email worm - worms themselves are sent to all email addresses they find on the infected system. - Internet worm known as "email worms are the most widely known modern worms and because of its method of distribution - through attachments. &lt;br /&gt;
2. &lt;b&gt;Trojan (Trojan)&lt;/b&gt; - Trojan horse virus which is most often a virus that is disguised as a regular program activities as listening to music or watch a multimedia file, the virus is hidden inside. Thus, users hardly understand that they are infected with viruses. &lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;Virus (Virus)&lt;/b&gt;&lt;/i&gt; A computer virus is a program that was created with the ability to replicate itself by infecting other files. When it comes to boot sector (boot sector) virus then infected boot sector of the operating system on a floppy disk or tvurdiya. Although the primary function that is certain viruses that multiply, most of them are dangerous because they contain code that breaks the information into the computer. The first computer virus was discovered in 1986 and since then the world have registered tens of thousands of virus. In most cases, only a small fraction of them are active and dangerous as contemporary antivirus programs largely protect consumers against new computer viruses, offering combined protection against Internet worms, viruses and Trojans. &lt;br /&gt;
&lt;i&gt;&lt;b&gt;Worm (Worm)&lt;/b&gt;&lt;/i&gt; Unlike viruses, computer worms are malicious programs that replicate themselves from one system to another, instead of infecting files located in your computer. For example, a worm that razporostranyava mass mail (mass-mailing email worm) send copies to all email addresses that you can find recorded in the infected computer. Network worm copies itself and spreads over the network, Internet worm spreads through Internet, etc. &lt;br /&gt;
&lt;b&gt;&lt;i&gt;Internet Worm (Internet Worm)&lt;/i&gt;&lt;/b&gt; Unlike viruses, worms do not infect other files. Instead, they are copied and distributed until completely discharge system resources on your computer. The most common and popular contemporary Internet worms worms are known as "email worm" because of its method of distribution - through attachments to emails sent to addresses taken from the Outlook Address Book or Outlook Express. To prevent this type of virus is necessary to never open attachments that you receive unexpectedly. &lt;br /&gt;
&lt;i&gt;&lt;b&gt;Trojan, Trojan (Trojan)&lt;/b&gt;&lt;/i&gt; The trojan is a program that installs to do something completely normal (eg to carry mp3 music), but actually doing something malicious (eg send numbers introduced credit cards gave a email address). Trojans are often used to obtain secret access to the system which are installed ie someone remotely control your computer. Trojans do not reproduce like viruses and do not spread as worms. &lt;br /&gt;
&lt;i&gt;&lt;b&gt;Macro Virus (Macro Virus) &lt;/b&gt;&lt;/i&gt;Macro viruses are written in programming languages (eg VisualBasic), supported by some products such as Microsoft Excel and Microsoft Word. Macros are small utilities that are included in a document to automatically perform certain actions for the user (eg, fast computation of a formula set values). Macro viruses are a common form of viral infection, which is exceeded only by Internet worms because of their easy distribution. As with any other virus, and macro viruses have a high risk of data loss. However, so far, Microsoft has introduced several forms of protection against unwanted execution of macros, this form of virus is widespread. Most often macro viruses infect a so-called "global template" (global template - as Normal.dot in Word), to be disseminated in any other documents on your computer. &lt;br /&gt;
&lt;b&gt;&lt;i&gt;Malware (Malware)&lt;/i&gt;&lt;/b&gt; Malicious code such as viruses, worms or Trojan horses are sometimes called "malware." &lt;br /&gt;
&lt;i&gt;&lt;b&gt;Polymorphic viruses (Polymorphic Virus) &lt;/b&gt;&lt;/i&gt;Polymorphic viruses change their code to avoid detection by antivirus programs. Polymorphic virus recode or change each time is recorded. This makes the possibility of very large variations. &lt;br /&gt;
&lt;b&gt;&lt;i&gt;Boot sector virus (Boot Sector Virus)&lt;/i&gt;&lt;/b&gt; Boot sector viruses are spread through infected floppy disks. This usually happens when users leave the disk in the floppy drive. When the system is started next time the computer tries to first boot from the floppy. If the disk is infected with boot sector virus, it will be recorded in the boot sector-and the hard disk. To protect your computer from boot sector viruses, you should change the settings in the CMOS so as to allow boot only from hard drive - C: \, but not from floppy - A: \. &lt;br /&gt;
&lt;i&gt;&lt;b&gt;Stealth (Stealth)&lt;/b&gt;&lt;/i&gt; Stealth viruses attempt to hide and can not be found. One method is to redirect calls made to the infected file. For example, the virus can stay in memory, and only when an application be made for writing on disk, it is activated. &lt;br /&gt;
&lt;i&gt;&lt;b&gt;File Viruses (File Viruses)&lt;/b&gt;&lt;/i&gt; File viruses infect executable files by inserting code in some parts of the original file so that code can be executed when someone is paid to the original file. In some cases, file viruses can label the whole file or delete the original and create a viral copy of the same name. File viruses always have as their purpose operating system (Windows, UNIX, Macintosh, DOS etc.).. Inscribing targets files resulting in total and irrevocable loss of original data. &lt;br /&gt;
&lt;b&gt;&lt;i&gt;Antivirus (Antivirus, Anti virus, Anti-virus)&lt;/i&gt;&lt;/b&gt; Antivirus or antivirus software is called a product which is used to detect malicious software code, protect computer system from infection and remove this code, if the infected system. Antivirus software is usually turned on by the producers themselves in independent tests to certify its quality and its ability to detect and remove viruses. &lt;br /&gt;
&lt;b&gt;&lt;i&gt;Disinfection (Disinfection)&lt;/i&gt;&lt;/b&gt; Cleaning, deleting or removing a virus called disinfection. In some cases disinfection can be achieved only by deleting the infected (infected) file. For example, a Trojan horse should always be deleted because it has no useful purpose and well-intentioned. On the other hand, a document that is infected with a macro virus should only be cleaned in order not to lose user data and utility macros. Although in most cases disinfection can be done without loss of valuable data, there is no guarantee that any file can be restored to its former condition. Therefore, antivirus experts recommend data recovery from pure backup copies. Anti-virus programs should rely only on the detection of viruses. However, if you saved up to date copy can restore a file by the antivirus program. &lt;br /&gt;
&lt;i&gt;&lt;b&gt;Heuristic (Heuristics)&lt;/b&gt;&lt;/i&gt; Heuristic scanning methods vary according to their manufacturer. Some companies argue that permit execution of certain actions of viruses in a secure and isolated environment. Other scanning every file opened or processed parts of malicious code. Heuristics are designed to detect unknown viruses before, so if viruses have recently written and distributed, the user still be protected. Heuristics are not 100% accurate and therefore recommends that users follow some basic rules of security for their computers are protected. &lt;br /&gt;
&lt;b&gt;&lt;i&gt;Blocking behavior (Behavior Blocking)&lt;/i&gt;&lt;/b&gt; Program behavior blocking monitors the actions of various files on your computer by preventing the operating system and related files from unwanted changes. Programs blocking behavior can monitor registry (registry) on Windows and warn the user if a program attempts to change it. So potrebitrelya may allow (for example, if you install new software) or to refuse to change (if any malicious program tries to save to your computer). Blocking behavior is a wonderful addition to other options to protect the operating system. &lt;br /&gt;
&lt;b&gt;&lt;i&gt;Check Integrity (Integrity Checker) &lt;/i&gt;&lt;/b&gt;Programs for checking the integrity scan and maintain a database of important information in the system or record critical system files. If a program tries to change any of these files, software for checking the integrity, will notify the user and will ask for consent. Programs for checking the integrity, can help a lot in protecting your computer system, but they require a higher level of knowledge in the field of viruses and computer software. &lt;br /&gt;
&lt;i&gt;&lt;b&gt;Antivirus Scanner (Scanner) &lt;/b&gt;&lt;/i&gt;Scanners are products used to detect malicious code. They also protect the system from infection and remove any existing contamination. Typically, scanners check files for malicious code in real time when the computer starts or when users make a request for verification. Scanners, also relying on methods of checking the integrity or blocking behavior to protect the system from unwanted changes. &lt;br /&gt;
&lt;b&gt;&lt;i&gt;Attachment (Attachment)&lt;/i&gt;&lt;/b&gt; Attachment is such a file is added to forwarded e-mail (email). The use of attachments is very convenient and useful. All modern programs (clients) to support sending email attachments, usually button in the program contains an image of a paper clip. On the other hand, sending attachments is the primary method of distribution of much of today's viruses. Virus writers often ask interesting names of attachments, thus causing the curiosity of the recipient. When launching the attachment, the virus runs and infects the system. &lt;br /&gt;
&lt;i&gt;&lt;b&gt;Portable Executable File (Portable Executable)&lt;/b&gt;&lt;/i&gt; Portable executable (PE EXE) is a program that can run itself on any operating system Windows (Windows 95, 98, NT, 2000, XP, and ME). An example of this file notepad.exe (Notepad). PE EXE may have an extension other than. Exe, for example. Scr - screen saver. &lt;br /&gt;
Active X (ActiveX) ActiveX controls are feasible or OLE. OCX files. Example of OLE (Object Linking and Embedding) is as ActiveX controls "notebook" which mozheda be integrated into a spreadsheet or text document. ActiveX controls can be performed only in the middle of the operating system Windows, as for each version create different controls. Unlike Java applets that are loaded only in browsers, ActiveX controls have access to the operating system itself, which in some cases, lead to security problems.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>krem158@gmail.com (The Fire)</author></item><item><title>Third Lesson - How To Hack  Someone</title><link>http://hackers-time.blogspot.com/2010/10/third-lesson-how-to-hack-someone.html</link><pubDate>Fri, 8 Oct 2010 04:57:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5476492143620458399.post-7412370517711813857</guid><description>&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title=""&gt;In this lesson we`ll talk about how we can hack someone's computer. &lt;/span&gt;&lt;span title=""&gt;Since the options that I describe are a few I will divide the lesson into several parts. &lt;/span&gt;&lt;/span&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title=""&gt;The most commonly used techniques are viruses, flood, fucked the Windows through remote access to the computer.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title=""&gt;In the First Part we`ll talk about viruses, types of viruses, their effects and uses.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title=""&gt;How to find them and all your questions, post in the Comments below the article.&lt;/span&gt;&lt;/span&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title=""&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title=""&gt;&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>krem158@gmail.com (The Fire)</author></item><item><title>Second Lesson - Increasing Connection Speed</title><link>http://hackers-time.blogspot.com/2010/10/second-lesson-increasing-connection.html</link><pubDate>Fri, 8 Oct 2010 04:32:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5476492143620458399.post-7416520264669715732</guid><description>&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title=""&gt;The  easiest way to improve the connection speed is to use softuer.&lt;/span&gt;&lt;/span&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title=""&gt; Before taking this step, you can check by testing how fast is your connection at the moment. &lt;/span&gt;&lt;span title=""&gt;In  the Internet are good tools available for this purpose - a search on &lt;b&gt; "Internet Speed Test"&lt;/b&gt; gives many results, simply select one of the  programs. &lt;/span&gt;&lt;span title=""&gt;Do the test several times so you can decide better what is the average speed of the connection. &lt;/span&gt;&lt;span title=""&gt;Then do the following changes:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title=""&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;First, remove the system&lt;b&gt; QoS&lt;/b&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title=""&gt; or &lt;b&gt;Quality of Service&lt;/b&gt;, which should in principle to help your relationship work better, but it may take up to 20% of speed. &lt;/span&gt;&lt;span title=""&gt;If you use Windows XP Professional, follow these instructions to turn off the QoS:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;&amp;nbsp; Click Start and then Run.&lt;/li&gt;
&lt;li&gt;&amp;nbsp; Enter "gpedit.msc" in the box.&lt;/li&gt;
&lt;li&gt;&amp;nbsp; Under "Local Computer Policy" click the plus sign next to "Computer Configuration", then click this to "Administrative Templates".&lt;/li&gt;
&lt;li&gt;&amp;nbsp; Click the plus sign next to "Network" and select "QoS Packet Scheduler".&lt;/li&gt;
&lt;li&gt;&amp;nbsp; In the box to the right, double-click "Limit Reservable Bandwidth".&lt;/li&gt;
&lt;li&gt;&amp;nbsp; On the Settings tab, select Enabled.&lt;/li&gt;
&lt;li&gt;&amp;nbsp; In the box "Bandwidth Limit%" set to 0%. (Do not leave the field blank, and must write 0%.)&lt;/li&gt;
&lt;li&gt;&amp;nbsp; Click OK.&lt;/li&gt;
&lt;/ol&gt;If you are using Windows Home Edition, follow these steps:&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; Click Start and then select Settings.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp; Select Control Panel and open "Network Connections".&lt;/li&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp; Right click on "Local Area Connection" and select Properties.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp; In the General tab uncheck the beak against the QoS. &lt;/li&gt;
&lt;/ol&gt;Apart from the changes, the networks are configured in Windows for the average user with a simple connection. They do not really know what connection you use - whether phone, DSL, or cable modem. It is therefore better to adjust network settings to your connection.The easiest way to do this is using the software. There are several programs that allow you to manage change. Some of them require you to enter values in the boxes, then they edit the Registry for you.&lt;br /&gt;
You can use TCP Optimizer. It only requires the user to specify the connection speed, how the connection and click on the button Optimize. After restarting your computer, your connection should have become significantly faster. &lt;br /&gt;
Now you can retest your connection speed.&lt;br /&gt;
&lt;br /&gt;
These changes are a small part of what you can do to speed up Internet connection. If you want to learn more tips to increase speed, write Comments in this article. &lt;br /&gt;
&lt;div class="g-section" id="gt-res-tools"&gt;&lt;div class="gt-icon-c" id="gt-res-listen" style="display: none;" tabindex="0"&gt;&lt;span class="gt-icon gt-icon-listen-off"&gt;&lt;/span&gt;&lt;span class="gt-icon-text"&gt;Чуйте&lt;/span&gt;&lt;/div&gt;&lt;div class="gt-icon-c" id="gt-res-roman" style="display: none;" tabindex="0"&gt;&lt;span class="gt-icon gt-icon-roman-off"&gt;&lt;/span&gt;&lt;span class="gt-icon-text"&gt;Прочит на латиница&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>krem158@gmail.com (The Fire)</author></item><item><title>First Lesson - Privacy</title><link>http://hackers-time.blogspot.com/2010/10/first-lesson-privacy.html</link><pubDate>Fri, 8 Oct 2010 01:33:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5476492143620458399.post-1163347481486475466</guid><description>&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;&lt;/span&gt;&lt;span style="" title=""&gt;Web  surfing is permitted, but the appropriation of foreign information,  passwords, credit card numbers &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;or s&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;abotage of foreign computer is illegal. &lt;/span&gt;&lt;span style="" title=""&gt;&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt; &lt;/span&gt;&lt;span style="" title=""&gt;For this reason, we will first learn to protect ourself in the Net. &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;We need not only to protect our computer against foreign attacks&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;, but also to hide well, can not anyone follow us.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;First, we need better protect our computer from foreign interference. &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;It is desirable the version of our Windows&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt; to maintain&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt; Service Pack. &lt;/span&gt;&lt;span style="" title=""&gt;So built FireWall &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;to some extent protects our computer. &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;There are cases where you need to disable that FireWall, so we need a good antivirus program.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;Personally, I prefer Avast Pro. &lt;/span&gt;&lt;span style="" title=""&gt;It  has not only built FireWall, but in case of foreign attack, immediately  signals and displays the IP address of the offender and thus we can  return the favor...&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;This program not only protects us from different viruses but does not allow us to infect entering the infected Website.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;Of  course there are many other antivirus programs, which if you have any  questions or &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;your opinion,&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt; you can set them in the Comments below this post.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;To hide ourself when&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt; we start to hack foreign computer&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;, also we need some programs.&lt;/span&gt;&lt;/span&gt; &lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;Zone Alarm  is a good program with many features, but sometimes it &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt; tied &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;our hands and  just when we are well to the purpose, can deny access and to block our  actions, but in some cases is useful. &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="short_text" lang="en"&gt;&lt;span style="" title=""&gt;When I want to hide my IP address, I use Hade Me IP.&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;&lt;/span&gt;&lt;span style="" title=""&gt; It not only hides my real IP address, but generates a new and makes &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;tracking&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt; very difficult, almost impossible. &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;This is a very useful program, where we use a computer with real IP.&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt; This program is paid, but do you believe that one hacker paid for something? &lt;/span&gt;&lt;span style="" title=""&gt;And how? We`ll learn in subsequent lessons.&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt; &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;&lt;br /&gt;Use of foreign Wireless also an option, but is quite slow and sometimes quite difficult to finish the work.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;The connection speed is also important. &lt;/span&gt;&lt;span style="" title=""&gt;The faster the connection, the more difficult is tracking us and easier to do our work. &lt;/span&gt;&lt;span style="" title=""&gt;How to increase the speed of your connection, will speak at our next lesson.&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="background-color: rgb(235, 239, 249);" title=""&gt;&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>krem158@gmail.com (The Fire)</author></item><item><title>Getting Started</title><link>http://hackers-time.blogspot.com/2010/10/getting-started.html</link><pubDate>Thu, 7 Oct 2010 16:36:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5476492143620458399.post-142608402920389644</guid><description>&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;        The &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;hacker is someone for whom in the computer world has no borders, protect, secrets and for him everything is possible. &lt;/span&gt;&lt;span style="" title=""&gt;The most important thing for the hacker is not stopped before the failure, not to be denied and seek the way to success.&lt;/span&gt;&lt;/span&gt;&lt;div id="gt-res-tools" class="g-section" style=""&gt;&lt;div style="display: none;" class="gt-icon-c" tabindex="0" id="gt-res-listen"&gt;&lt;span class="gt-icon gt-icon-listen-off"&gt;&lt;/span&gt;&lt;span class="gt-icon-text"&gt;Чуйте&lt;/span&gt;&lt;/div&gt;&lt;div class="gt-icon-c" tabindex="0" style="display: none;" id="gt-res-roman"&gt;&lt;span class="gt-icon gt-icon-roman-off"&gt;&lt;/span&gt;&lt;span class="gt-icon-text"&gt;Прочит на латиница&lt;/span&gt;&lt;/div&gt;        &lt;span id="result_box" class="short_text" lang="en"&gt;&lt;span style="" title=""&gt;The tools of a hacker are &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;Good Кnowledge in &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="short_text" lang="en"&gt;&lt;span style="" title=""&gt;:&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;At least one Programming Language&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;&lt;/span&gt;&lt;span style="" title=""&gt;Operating systems&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;&lt;/span&gt;&lt;span style="" title=""&gt;Internet&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;&lt;/span&gt;&lt;span style="" title=""&gt;Antivirus Programs&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;&lt;/span&gt;&lt;span style="" title=""&gt;Viruses, Worms, etc.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;&lt;/span&gt;&lt;span style="" title=""&gt;Different types of programs&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span id="result_box" class="short_text" lang="en"&gt;&lt;span style="" title=""&gt;And last but not least - Creativity&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;        Before we start attacking someone or something we`ll first learn to protect ourselves. &lt;/span&gt;&lt;span style="" title=""&gt;In the next lesson we'll learn how to protect and remain unnoticed in cyberspace.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>krem158@gmail.com (The Fire)</author></item><item><title>Brief Introduction</title><link>http://hackers-time.blogspot.com/2010/10/brief-introduction.html</link><pubDate>Thu, 7 Oct 2010 15:35:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5476492143620458399.post-6050598226471625266</guid><description>&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:worddocument&gt;   &lt;w:view&gt;Normal&lt;/w:View&gt;   &lt;w:zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:hyphenationzone&gt;21&lt;/w:HyphenationZone&gt;   &lt;w:punctuationkerning/&gt;   &lt;w:validateagainstschemas/&gt;   &lt;w:saveifxmlinvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:ignoremixedcontent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:alwaysshowplaceholdertext&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:compatibility&gt;    &lt;w:breakwrappedtables/&gt;    &lt;w:snaptogridincell/&gt;    &lt;w:wraptextwithpunct/&gt;    &lt;w:useasianbreakrules/&gt;    &lt;w:dontgrowautofit/&gt;   &lt;/w:Compatibility&gt;   &lt;w:browserlevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;  &lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:latentstyles deflockedstate="false" latentstylecount="156"&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;  /* Style Definitions */  table.MsoNormalTable  {mso-style-name:"Table Normal";  mso-tstyle-rowband-size:0;  mso-tstyle-colband-size:0;  mso-style-noshow:yes;  mso-style-parent:"";  mso-padding-alt:0cm 5.4pt 0cm 5.4pt;  mso-para-margin:0cm;  mso-para-margin-bottom:.0001pt;  mso-pagination:widow-orphan;  font-size:10.0pt;  font-family:"Times New Roman";  mso-ansi-language:#0400;  mso-fareast-language:#0400;  mso-bidi-language:#0400;} &lt;/style&gt; &lt;![endif]--&gt;  &lt;p style="color: rgb(0, 0, 0); text-align: justify;" class="MsoNormal"&gt;&lt;span style="" lang="EN"&gt;    &lt;span style="color: rgb(204, 255, 255);"&gt;     &lt;/span&gt;&lt;span style="color: rgb(255, 255, 255);font-family:times new roman;font-size:130%;"  &gt;&lt;span&gt;How to become a hacker? &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: rgb(255, 255, 255);font-family:times new roman;font-size:130%;"  &gt;&lt;span title=""&gt;Many people dream to be hackers. Some succeed while others do not ... What it takes to be a hacker? Knowledge, the ability to apply them, cunning, ingenuity and a little talent...&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p  style="color: rgb(255, 255, 255); text-align: justify;font-family:times new roman;" class="MsoNormal"&gt;&lt;span style="font-size:130%;"&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;         One person can not to know everything, &lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;but he should be able to use their knowledge and enrich them. &lt;/span&gt;&lt;span style="" title=""&gt;On the pages of this blog I will teach you of everything that I can and I will be glad to teach everything that you can do better than me.&lt;br /&gt;&lt;/span&gt;&lt;span title=""&gt;&lt;/span&gt;&lt;/span&gt;&lt;span id="result_box" class="" lang="en"&gt;&lt;span style="" title=""&gt;         Not save their comments so we can be mutually beneficial!&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>krem158@gmail.com (The Fire)</author></item></channel></rss>