Hacking vs Security : The Anatomy of Hacking ~ Coding Savvy
FB Twitter Google
» »

Hacking vs Security : The Anatomy of Hacking

When it comes to security every developer needs to consider doing some test on their web application before deployment to the web. On this Article we are going to be discussing about Hacking, Security and Preventive measures that can be taken to secure your web applications. It may seem unthinkable that any normal person would carelessly leave valuable assets lying around where it can be stolen. and yet we see this happening every day in the computer world, where codes written without any security measure to secure the data they work with or secure the access to the resource of the server in which they run. Addressing security issues is more complex than people think, If we are to discuss web application security as a whole we will have to write a book for it, What am going to do is to highlight just some thing you need to know to be security conscious but during this process we are also going to look into some vulnerabilities of web applications. Hacker was once a very good programmer but not all of them as you can see in the image above there are two categories, as we know "Satan was once an angel" In other words in case you’re reading this article to learn hacking my advice is learn programming no one is borne a hacker.

Let start by discussing how every developer should make application security their mind set and explain why total computer security is, finally, impossible, mostly in large, enterprise-level applications. What Is Computer Security? Computer security is often thought of as a simple matter of keeping private data private. (Chris Snyder) Why Total Computer Security Is Impossible? Most programmers are almost completely isolated from binary code and memory management, so the following explanation may seem pretty theoretical. But it’s important to remember that everything we do comes down to the 1s and 0s, the binary digits, the bits, the voltages across a transistor, that are the language of the CPU. And it’s especially important to remember that your code does not exist in a vacuum but is compiled and executed by the kernel as part of a complex system. Let take for example this is a 0. And this is a 0. These 0s might be stored in different locations of a computer’s memory, but when presented to the processor they are absolutely identical. There is no way to tell whether one was created before or after another, no handwriting analysis or fingerprints or certificate of authenticity to differentiate them. Good program, written by expert programmers, keeps track of which is which. Likewise, if an attacker surreptitiously replaces one of those 1s with a 0, the processor has no authority to call the 0 invalid. It looks like any other 0, and aside from not being a 1, it looks like any other bit. It is up to the software presenting the 0 to compare it against some other location in memory, and decide whether it has been altered or not. If this check was poorly implemented, or never written at all, the deception goes unnoticed. Take note of this words, don’t think you are too small to be hacked, most webmasters think their site has no value that can attract hackers but that’s not how it works, Hackers have scanners that scans the web for vulnerable sites before they lunch an attack. Two of my projects have been previously hacked, It would have been worse if I did not have a backed up copy of the project, the mistake I made was thinking the project is too small to be noticed on the internet but I learned it the hard way that Hackers simply don’t care. Then I decide to take a step into hacking and the secret behind hacking, luckily for me one of the projects that was hacked, The hackers fail to destroy their hacking tools. Then I realize that it so powerful that it can take over the entire server. I kind of hate to write a long boring article, so we will continue with Hacking later.
Was this article helpful?
Thanks! Your feedback helps us improve tutorials.

You May Also Like...

No comments:

Post a Comment