tag:blogger.com,1999:blog-14136519086584826092024-03-14T00:18:40.746+08:00FilHackerLearn to hack, not for cracking but for security.Freelancehttp://www.blogger.com/profile/15171368934479713762noreply@blogger.comBlogger10125tag:blogger.com,1999:blog-1413651908658482609.post-66075826164566089962012-11-24T03:56:00.001+08:002013-01-24T18:01:34.759+08:00Welcome to the World of Hacking and Security<div dir="ltr" style="text-align: left;" trbidi="on">
<p>First of all, the term <strong>computer safety</strong> is a branch of computer technology, including techniques and strategies, known as computer security information which applied to computers and computer networks. It is officially named as <i>"computer security"</i> which objective includes the protection of information and property whether it's private or not, from computer criminals such as theft and black hat hacker also called as cracker, or corruption or natural disaster, while allowing the information accessible to its intended users. <strong>Computer security researcher</strong> is a person who searches different kinds of tips and tutorials relating to computer security. But of course! The best computer expert is the researcher who also find weaknesses of a gadget or computer's resource as a hacker, to ensure the security of their own information system or the security of their organization's system.</p>
<p><div style="float: left; width: 150px;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-ql31r1S0D5M/UPjuJJT3YRI/AAAAAAAAA7Q/neXPI_VFO-E/s1600/white_hat_of_the_philippines_2.png" imageanchor="1" style=""><img border="0" height="65" width="125" src="http://2.bp.blogspot.com/-ql31r1S0D5M/UPjuJJT3YRI/AAAAAAAAA7Q/neXPI_VFO-E/s320/white_hat_of_the_philippines_2.png" alt="The first, White Hat of the Philippines II"></a>
<small>The first seal of Filipino Hacker's blog, White Hat of the Philippines. It's simple but seriously created by the admin of this blog which takes many days before the admin have finished it.</small></div>
</div>
<strong>Filipino Hacker</strong> is an informational site about hacking and security of computer where readers, viewers, or visitors can join to be a member and receive a free update of a new published blog post related on hacking technique with security tips to let them exactly know with their logic how to secure themselves from the kind of the attack which is written therein the new post. We teaches different kinds of hacking strategies for the security purpose of our readers to let them think as a black hat hacker <i>(also known as cracker)</i>, for them to know what they shouldn't do to avoid getting caught by cybercriminal and computer criminal. Become our regular reader and learn to hack for your security purpose and not to crack!</p>
</div><a href="http://filhacker.blogspot.com/2012/11/welcome-to-world-of-hacking-and-security.html#more">Read more »</a>Freelancehttp://www.blogger.com/profile/15171368934479713762noreply@blogger.com0tag:blogger.com,1999:blog-1413651908658482609.post-67559075583254418782012-11-28T03:12:00.000+08:002013-01-24T17:58:22.008+08:00Differences Between White and Black Hats<div dir="ltr" style="text-align: left;" trbidi="on">
<p>There are many specific types of hackers, and the popular two of those are a black hat and a white hat. A black hat hacker is <i>(of course,)</i> a hacker whom ignoring and does not care if they're violating the computer security of a system and network. For the cause of the results of what they have done, <i>(how evil, stupidity, and harmful are them,)</i> such as cracking, breaking, and making a computer system or network unusable for the intended users, they were called/named as a <strong>cracker</strong>. And not just that! They can also be sue and put to jail when they've caught with their victim. Instead they've use their knowledge on making their own decent business, they've used it to disturbed the business of the other. <i>(What a pity!)</i> Some of the computer systems of their victims are build within many days and not just a few days!</p>
<p><div style="float: left;">
<a href="http://1.bp.blogspot.com/-HfVIusHEtLA/UPjxEyhD-oI/AAAAAAAAA7o/1jyt2il9szs/s1600/white_hat_and_black_hat.png" imageanchor="1" style=""><img border="0" height="100" width="100" src="http://1.bp.blogspot.com/-HfVIusHEtLA/UPjxEyhD-oI/AAAAAAAAA7o/1jyt2il9szs/s320/white_hat_and_black_hat.png" alt="White Hat and Black Hat (Edited)"></a></div>
And a white hat hacker is someone that can hack or have a hacking knowledge, but they didn't using their skills <i>(in computer)</i> to harm the other person. And there's more! Most white hat hackers are basically knowledgeable on security, on how to secure the vulnerability of a computer system and network if it have. And that is there purpose why they do hacking, to study and to know exactly how to secure the leak of a computer system and network. Actually, most of them were hacking their own computer systems or the systems of their clients with the permissions of them, searching for a vulnerability, and study how to secure the bug. That's why they were titled as a <strong>computer security expert</strong> and ethical hacker. But there maybe some white hats that do hacks the computer system of the other person without a single permission, yet they do not damage it, just to increase their experience and securing ability.</p>
</div><a href="http://filhacker.blogspot.com/2012/11/differences-between-white-and-black-hats.html#more">Read more »</a>Freelancehttp://www.blogger.com/profile/15171368934479713762noreply@blogger.com0tag:blogger.com,1999:blog-1413651908658482609.post-45489131047937129382012-12-17T01:18:00.000+08:002013-01-24T17:55:47.428+08:0020 Steps to Writing and Reading in LeetLearn to encode a text by substituting letters with numbers & symbols, adding or changing the suffix of the words therein, and abbreviating or shortening & misspelling them.
<ol>
<li>Changing the alphabet, especially the vowels, with numbers & symbols. For example, the word "Leet" will be written as 1337. Just write in graphical text like emoticons, such as :) happy and :( sad smileys.</li>
<li>Some new Leetspeakers write a text in right capitalization, such as '|'hè f!rs+ |è++èr !n +h!s sèn+ènçé !s b!9. But in leet, there's no capitalization! Whether there's a big and small letters on a word, such as \/\/o|2d. Unless it can understand by leetspeakers, it doesn't matter!</li>
<li>There's no official alphabet. So, you can create your own style of graphical text. Just do not include (;) semicolon, ([) left and (]) right square brackets, (<) less and (>) greater-than signs because these can be the cause of error on some text editors.</li>
<li>Misspelling a word, just make it sounds like the word that you're trying to imitate. Just like the letter S, mostly on plural suffix, can be replaced by Z, neither Z replaced by S. For example, HATS will become HATZ and QUIZ can spelled as QUIS. S and Z are parallel.</li>
<li>One of the two pupular groups of 2 or 3 letters that parallel to a single letter or 2 letters, but still sounds as what as they are, is the CKS which is parallel to X or XX. But if it's just CK without the S, it is just parallel only to X. So, the word "rocks" can spelled as ROX or ROXX. But the singular word "hack" will be just HAX. Try to read "53Ç|{5", note that the Ç|{5 is sounds as }{.</li>
<li>Likewise the second of the two popular groups of 2 letters which is parallel to a single letter. The PH who's parallel to letter F. For example, FEAR can spelled as PHEAR, and PHILIPPINES can be translated as FILIPPINES. Just remember to write it in Leet, in graphical text as 1337.</li>
<li>Change the -ER suffix into -OR or -AH. For example, the word "hacker" may spelled as |-|4}{0|2, because HACK- is translated to HAX- and the -ER therein become -OR. The other word "master" will become MASTAH.</li>
<li>You can remove a silent letter on any word. For example, you can write "wat" as WHAT, and "wen" as WHEN. Neither you can add a silent letter to any word as a pronunciation style, such as FHIRE, WHATER, YHIN and YHANG.</li>
</ol><a href="http://filhacker.blogspot.com/2012/12/20-steps-to-writing-and-reading-in-leet.html#more">Read more »</a>Freelancehttp://www.blogger.com/profile/15171368934479713762noreply@blogger.com0tag:blogger.com,1999:blog-1413651908658482609.post-43393820675080798412012-12-19T03:52:00.000+08:002013-01-24T17:49:44.779+08:00The Leet Alphabet (Including Digraphs)Leet <i>(sometimes translated as "1337")</i>, also known as eleet or leetspeak, is another alphabet in the combination of letters, numbers and symbols, for the English language but can be used with other languages including Filipino <i>(or Tagalog)</i> the official national language of the Philippines. Every other article about leet alphabet have a different graphical letter on the list of their letters, 'cause there's no official alphabet for <i>1337</i>. Every leet alphabet on every other article, have their own version of graphical alphabet. A digraph are a pair of characters used together to represent a single sound that doesn't correspond to the normal values of the two or more characters combined, such as <i>"oh"</i> in English. Some languages including Filipino, digraph is considered an individual letter which means that they have their own place in the alphabet. The version of our leet alphabet are the only version that have included the digraphs of leet, such as <i>CK</i>, <i>CKS</i>, <i>KW</i>, <i>PH</i> and <i>XX</i>. These are the list of the graphical letters of our leet!
<ul>
<li><b>A:</b> 4 <sup>or</sup> @ <sup>or</sup> /-\</li>
<li><b>B:</b> }3 <sup>or</sup> |3</li>
<li><b>C:</b> Ç <sup>or</sup> (</li>
<li><b>ck:</b> }{ <i>(as letter X)</i></li>
<li><b>cks:</b> }{}{ <i>(as double X)</i></li>
<li><b>D:</b> |) <sup>or</sup> |}</li>
<li><b>E:</b> 3</li>
<li><b>F:</b> |?|-| <i>(as digraph PH)</i> <sup>or</sup> }= <sup>or</sup> |=</li>
<li><b>G:</b> 6 <sup>or</sup> 9</li>
<li><b>H:</b> |-|</li>
<li><b>I:</b> 1 <sup>or</sup> | <sup>or</sup> !</li>
<li><b>J:</b> _) <sup>or</sup> _| <sup>or</sup> _/ <sup>or</sup> `/ <i>(or any graphical letter of Y)</i></li>
<li><b>K:</b> |{ <sup>or</sup> |( <sup>or</sup> }?</li>
<li><b>kw:</b> (,) <i>(as letter Q)</i></li>
<li><b>L:</b> 1 <sup>or</sup> |_ <sup>or</sup> |</li>
<li><b>M:</b> /\/\ <sup>or</sup> /V\ <sup>or</sup> /v\</li>
<li><b>N:</b> |\| <sup>or</sup> /\/ <sup>or</sup> /V</li>
<li><b>O:</b> 0 <i>(as zero)</i> <sup>or</sup> () <sup>or</sup> ¤</li>
<li><b>P:</b> |?</li>
<li><b>ph:</b> }= <i>(or any leet letter of F)</i></li>
</ul><a href="http://filhacker.blogspot.com/2012/12/the-leet-alphabet-including-digraphs.html#more">Read more »</a>Freelancehttp://www.blogger.com/profile/15171368934479713762noreply@blogger.com0tag:blogger.com,1999:blog-1413651908658482609.post-47381609333527428422012-12-08T23:53:00.000+08:002013-01-24T17:45:12.383+08:00What is Leet ("1337"), A.K.A. Eleet or Leetspeak<p>Do you sometime see a word written in the combinations of letters, numbers, and symbols even sometimes it doesn't have any single letter, like <b>\/\/0|2|)</b> on an online community, especially in an online gaming? Do you know what are the reasons why some people write a sentence or text in that way? When you see a word like that, mostly when you're using computer, it is a text written in Leet used by some online gamers, script kiddies, hackers, and some individuals such as adults. Leet or <i>"1337"</i>, also known as <strong>eleet</strong> or leetspeak was originated as an encrypted or encoded text of a hacker. Maybe the words or sentence that these hackers want to encode was too complicated. It is mostly used for English language, but can also be used for other languages including Filipino or Tagalog.</p>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-am-I5fVUYYA/UPjzPo5xBQI/AAAAAAAAA8A/Nv9TkaRZiA0/s1600/filipino_white_hat_hacker_in_leet.png" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="19" width="320" src="http://2.bp.blogspot.com/-am-I5fVUYYA/UPjzPo5xBQI/AAAAAAAAA8A/Nv9TkaRZiA0/s320/filipino_white_hat_hacker_in_leet.png" alt="Filipino ‘White Hat’ Hacker Written in Leet or '1337' (Edited)"></a><br>
<small>One of many ways to write the title <i>“Filipino ‘White Hat’ Hacker”</i> in Leet or 1337.</small></div>
<p>Most people who have <strong>Leetspeaking</strong> are online gamers, specially the game's cheaters. But they don't know what is its real use for. They don't really care why they've using it! But the cause why they've doing it, is because it's just their practice and they just wanted it. There are also script kiddies who often uses Leet, just to show to the people who will going to read their message or comment, that they're a hacker. But in reality, they're not hackers but a skiddie. It is also used by some individuals just to hide a sensitive text which not good in the sight of a child, for those who has no capacity to guess what does they mean, such as <i>@$$</i> and I'm pretty sure that you can guess that 1337 word if you're an adult. And last, the hackers who were originally used Leet! They still sometime use it to avoid search engines from catching the keywords of their public websites and public groups' news with their complicated message, comment, or announcement. But still, any other people can use Leet depend on their reason why they want it to use.</p>
<a href="http://filhacker.blogspot.com/2012/12/what-is-leet-1337-aka-eleet-or-leetspeak.html#more">Read more »</a>Freelancehttp://www.blogger.com/profile/15171368934479713762noreply@blogger.com0tag:blogger.com,1999:blog-1413651908658482609.post-52043374244642239772012-12-05T16:27:00.000+08:002013-01-24T17:44:27.856+08:00Seven Types of Computer Security Hackers<p>One of the most popular Internet users are a hacker. But do you know that there are many different types of computer security hackers? It's not because if someone is a hacker, means that this person is a hacker without classification. And the other rumored are just individuals who uses automated tools developed by a hacker, and not a hacker. For now, there are seven <i>(real and not imaginary)</i> types of hackers. And you can see those seven below, and may know if a script kiddie is a type of hacker:</p>
<ol>
<li><strong>White hat hacker</strong>: An ethical hacker who have permitted by a company to find a vulnerability into their computer system and network or website, and secure it if they found some leak. They are also known as a <i>“computer security expert”</i>, sneakers, red teams, or tiger teams.</li>
<li><strong>Black hat hacker</strong>: A programmer who develops their own scripts or programs to crash or corrupt or to steal the information on the computer system or website of their target. For the cause of what they've done, they was titled as a <i>"cracker"</i>.</li>
<li><strong>Grey hat hacker</strong>: Someone who hack websites and computer systems and networks without any single signed permission of their target, and if they found a vulnerability or bug, they may slightly attack it, and surely offer to the administrator to fix it for a small fee.</li>
<li><strong>Blue hat hacker</strong>: A hacker which employed outside the computer security of a company to find exploits on their products, so that they will be closed and avoid getting much problem in the coming future. <strong>Microsoft</strong> spelled the word <i>“Blue Hat”</i> without space as <i>"BlueHat"</i>.</li>
<li><strong>Neophyte</strong>: A programmer that starting to studies how to hack a website or computer system and network, and doesn't have any classification yet. They are still in learning before they've claim themselves a classification, such as a white hat, black hat, grey hat, or blue hat.</li>
</ol><a href="http://filhacker.blogspot.com/2012/12/seven-types-of-computer-security-hackers.html#more">Read more »</a>Freelancehttp://www.blogger.com/profile/15171368934479713762noreply@blogger.com0tag:blogger.com,1999:blog-1413651908658482609.post-53056343863956384412012-12-03T17:43:00.000+08:002013-01-24T17:42:54.994+08:00The Meanings of Neophyte and Hacktivist<p>All of the programmers who have a strong understanding how computer and network work, which entering in the world of hacking, is titled as a <strong>neophyte</strong> <i>(at hacking)</i>. It means that they are a new hacker without any classification yet and in learning before they claim themselves to a classification, such as white hat a computer security expert, black hat an evil side which also known as cracker, grey hat a combination of a white hat and a black hat, or blue hat which employed outside computer security confirming firms to bug test. And don't be confuse with a script kiddie, because a skiddie is not a hacker, but just pretending to be a hacker. A skid are doesn't have a proper understanding how computer systems and networks work, and no capacity to develop their own programs. Instead a neophyte, they are a programmer and can develop their own scripts and programs.</p>
<p>Anyone who finds weaknesses in a computer system or network to shout their social, religious, or political idea and issue, can be called as a <strong>hacktivist</strong>. Most of them are <i>“cyber protesters”</i> and involves website defacement or <b>D</b><sup>enial-</sup><b>o</b><sup>f-</sup><b>S</b><sup>ervice</sup> attacks. But still, in hacking community, anyone who uses automated tools such as scripts and programs developed by the other programmer, without proper understanding how it and a computer system and network work, is still a script kiddie. Hacktivists may defaced the website of their target, chance the visual of it, to a web page that they've developed with their message, and may warn their target that they will attack, mostly by DoS, the computer system of their target if their request ignored or did not granted.</p>
<a href="http://filhacker.blogspot.com/2012/12/the-meanings-of-neophyte-and-hacktivist.html#more">Read more »</a>Freelancehttp://www.blogger.com/profile/15171368934479713762noreply@blogger.com0tag:blogger.com,1999:blog-1413651908658482609.post-75187630021174784182012-12-02T03:23:00.000+08:002013-01-24T17:42:02.610+08:00What are a Grey Hat and Blue Hat Hackers<p>A grey hat hacker is someone who act like a <strong>combination of a black hat and a white hat</strong>. These may hack into a computer system and network without signed permission, to notify the system or network's administrator that their system/network is vulnerable and then offer to repair it for a cost. And that's why they act both a white hat and black hat, because they're doing it for a good purpose but still hacking without signed permission for a company. So, that's why they was titled as <i>“grey hat”</i>.</p>
<p class="mobile-photo" align="center"><a href="http://1.bp.blogspot.com/-FKzUIxtlkUA/ULpUDiyiHoI/AAAAAAAAA4U/oBok0UgXgGI/s1600/grey_hat_and_blue_hat-794279.jpg"><img src="http://1.bp.blogspot.com/-FKzUIxtlkUA/ULpUDiyiHoI/AAAAAAAAA4U/oBok0UgXgGI/s320/grey_hat_and_blue_hat-794279.jpg" border="0" alt="Grey Hat and Blue Hat" id="BLOGGER_PHOTO_ID_5817054288557514370"></a></p>
<p>A blue hat hacker is a computer security expert that are employed <strong>outside the computer</strong> security of a company to search a bug or used to bug test a system before a company lunch this tested system. They're looking for exploits on the systems, so that they can be closed, to avoid the problem get bigger. Usually, <strong>Microsoft</strong> uses the term <i>"BlueHat"</i>, with the capital letters of <b>B</b> and <b>H</b> and no space, <i>[ ]</i> to refer a computer security professional that they invited to find a vulnerability of or to hack their products such as <strong>Windows</strong>, and to report it unto them.</p>
<a href="http://filhacker.blogspot.com/2012/12/what-are-grey-hat-and-blue-hat-hackers.html#more">Read more »</a>Freelancehttp://www.blogger.com/profile/15171368934479713762noreply@blogger.com0tag:blogger.com,1999:blog-1413651908658482609.post-85761235526597666282012-11-29T23:06:00.000+08:002013-01-24T17:40:48.685+08:00(A Unique,) Script Kiddie vs. Elite Hacker<p>A script kiddie, also known as <strong>skiddie</strong> and skid for short, are individuals who use scripts or programs developed by a real hacker, to run a cheat into online or offline games, and to attack or break the computer systems and networks, without the proper understanding how the automated tools that they've used work. Most skids are an easy gamer whom learn to search the hacks of the games that they want to cheat, with the help of the Internet. Then, for the cause of what they've hearing, they're learning to search different kinds of hacks, especially a hack for a website, mostly a <b>D</b><sup>enial</sup> <b>o</b><sup>f</sup> <b>S</b><sup>ervice</sup>. Skiddies often used Leet or 1337, also known as Leet speak, substituting letters with numbers and symbols, abbreviating a word, and substituting word's suffix with another suffix or adding suffix to a word, just to notice the readers that they're a hacker. But in fact, they're not, they are just a script kiddie.</p>
<p>An elite hacker is used to describe the most skilled hackers depend on their classification or type, such as white hat or black hat. They are experts in the line of their work, and can find another different way to hack or to secure a computer system and network. They are an experienced <strong>programmer</strong> that can developed a computer program or system, depend on their classification. They sometimes use Leet speak too, substituting, abbreviating or short cutting, adding, and encrypting the words in hacker's slang, like a looser grammar and loose spelling, to avoid search engines from catching keywords on their websites and groups' news. Even though they're the skillful hackers whom originate the Leet, they just use it, only if it's needed because they <i>(basically)</i> do not want the other people to knew that they're a hacker.</p>
<a href="http://filhacker.blogspot.com/2012/11/a-unique-script-kiddie-vs-elite-hacker.html#more">Read more »</a>Freelancehttp://www.blogger.com/profile/15171368934479713762noreply@blogger.com0tag:blogger.com,1999:blog-1413651908658482609.post-84903453648493082102012-11-26T15:52:00.000+08:002013-01-24T17:38:35.810+08:00Literal Meanings of Hacking and Security<p>Some people when they've heard about the word <i>"hacker"</i>, thought that the kind of the person which pointing on what they've heard is a kind that can access to the user account of the other person without the permission of the account's owner. But if we want the deep meaning of hacker, it's not as just easy as like that! Because anyone who finds a weakness on computer systems and networks can be called as hacker. There are now many articles on the <b>W</b><sup>orld</sup> <b>W</b><sup>ide</sup> <b>W</b><sup>eb</sup> and online communities which teaches or have tutorials about hacking and security. Most hackers can do both of hacking and security.</p>
<p>The word <i>"hacking"</i> is an action, and the <i>"hacker"</i> is the doer of the action of hacking. Here, we will know what are the deep meaning and the importance of hacking. Many hacking communities on the Web has a forum category not just of <i>"Hacking"</i>, but of <i>“Hacking and Security”</i>, with security.. Do you know why is it like that? Because, imagine that you've wanted to fix a thing 'cause it is not working. Of course, you will need to find the broken part of it, the cause why it's not working. It's the same thing as that category. It is hacking and security when it comes in computer security, because you will need to hack, to find the weakness of a computer system or network, for you to be able to fix it and increase its security very well.</p>
<a href="http://filhacker.blogspot.com/2012/11/literal-meanings-of-hacking-and-security.html#more">Read more »</a>Freelancehttp://www.blogger.com/profile/15171368934479713762noreply@blogger.com0