Dismiss Notice
You are browsing this site as a guest. It takes 2 minutes to CREATE AN ACCOUNT and less than 1 minute to LOGIN

Usa vs china vs romania nani mkali in hacking

Discussion in 'Tech, Gadgets & Science Forum' started by Machozi ya Simba, Jun 6, 2012.

  1. Machozi ya Simba

    Machozi ya Simba JF-Expert Member

    Jun 6, 2012
    Joined: Feb 23, 2012
    Messages: 1,594
    Likes Received: 260
    Trophy Points: 180
    wadau wote wapenz wa mambo ya hacking hivi kati ya hizi nchi nani ni kiboko cha mkolon in hacking tactics, au unaona kuna nchi gan nyingine ni noma?
  2. Mnandi

    Mnandi Senior Member

    Jun 6, 2012
    Joined: Aug 30, 2011
    Messages: 160
    Likes Received: 0
    Trophy Points: 0
    USA ofcourse,,
  3. N

    Nyasiro Verified User

    Jun 7, 2012
    Joined: Feb 20, 2012
    Messages: 1,283
    Likes Received: 17
    Trophy Points: 135
    USA iko juu lakini hata India nao ni wazuri kwenye haya mambo.
  4. cmoney

    cmoney JF-Expert Member

    Jun 7, 2012
    Joined: Oct 14, 2011
    Messages: 676
    Likes Received: 118
    Trophy Points: 60
    mrussia weye
  5. Machozi ya Simba

    Machozi ya Simba JF-Expert Member

    Jun 7, 2012
    Joined: Feb 23, 2012
    Messages: 1,594
    Likes Received: 260
    Trophy Points: 180
    wow kuna mnigerha naye jama ana rock
  6. c

    chilubi JF-Expert Member

    Jun 7, 2012
    Joined: Sep 21, 2011
    Messages: 1,789
    Likes Received: 98
    Trophy Points: 145
    Watanzania washawahi kuhack? Afu Tz is safe to crack local websites coz i think hakuna sheria inayodeal na cybercrimes kama za hacking right?
  7. NingaR

    NingaR JF-Expert Member

    Jun 7, 2012
    Joined: Apr 15, 2012
    Messages: 2,837
    Likes Received: 13
    Trophy Points: 135
    Jaribu Uone
  8. King2

    King2 JF-Expert Member

    Jun 7, 2012
    Joined: Nov 16, 2011
    Messages: 1,292
    Likes Received: 7
    Trophy Points: 0
    Tanganyika .
  9. Machozi ya Simba

    Machozi ya Simba JF-Expert Member

    Jun 7, 2012
    Joined: Feb 23, 2012
    Messages: 1,594
    Likes Received: 260
    Trophy Points: 180
    halafu tcu mjue ya kwamba ilikua hacked na watu wa rwanda sio tz
  10. Chief-Mkwawa

    Chief-Mkwawa Platinum Member

    Jun 7, 2012
    Joined: May 25, 2011
    Messages: 14,396
    Likes Received: 3,257
    Trophy Points: 280
    naona marekani urusi na nchi nyengine kubwa hackers sio wengi ila waliopo wanakua tishio yaani unakuta serikali ya urusi ina train hackers wahack website ya kimarekani and vice versa ila tunaposema hackers individual ni nchi hizi 5
    Believe it or not hawa jamaa ni noma.

    According to survey za mwaka 2012 hii ni top 10
    Source kpcb
    Kutokana na uzoefu wangu wa net nawacategorise katika makundi matatu.
    Hapa kuna iran, urusi, na usa hawa hackings zao nyingi utakuta iran kahack website ya olimpik mara russia kahack web ya cia na vitu kama hivo.

    Hapa kuna china, india, philipines na indonesia hawa jamaa ndo watengenezaji wakubwa wa tools za kuhack na utilities nyengine ndio waanzilishi wa hackings ndogo ndogo.

    Hapa kuna nigeria, mexico, turkey aisee hawa jamaa usiombe wajue hackings utakoma kazi zao kushinda net na kusearch source wakipata wamekumaliza.

    Sasa hivi kuna vita kati ya china na ufilipino website za serikali na vyuo vingi zimekua hacked link

  11. Machozi ya Simba

    Machozi ya Simba JF-Expert Member

    Jun 7, 2012
    Joined: Feb 23, 2012
    Messages: 1,594
    Likes Received: 260
    Trophy Points: 180
    mkuu chief naona romania ureplace kwenye nigeria ka vp
  12. brazilian

    brazilian JF-Expert Member

    Jun 7, 2012
    Joined: Feb 10, 2012
    Messages: 607
    Likes Received: 4
    Trophy Points: 0

    Russia ni mwisho wa kokoto. hata viruses mostly wanatoka huko russia. Ndio maaana vile vile ni wazuri kwa kutengeneza Antiviruses
  13. Chief-Mkwawa

    Chief-Mkwawa Platinum Member

    Jun 7, 2012
    Joined: May 25, 2011
    Messages: 14,396
    Likes Received: 3,257
    Trophy Points: 280
    Ntareplace vp? Hizo ni data za kpbc si mimi nilofanya hiyo research.
  14. Machozi ya Simba

    Machozi ya Simba JF-Expert Member

    Jun 7, 2012
    Joined: Feb 23, 2012
    Messages: 1,594
    Likes Received: 260
    Trophy Points: 180
    mkuu chief hizo data za mwaka gani
  15. Chief-Mkwawa

    Chief-Mkwawa Platinum Member

    Jun 8, 2012
    Joined: May 25, 2011
    Messages: 14,396
    Likes Received: 3,257
    Trophy Points: 280
    Za 2012
  16. Brakelyn

    Brakelyn JF-Expert Member

    Jun 8, 2012
    Joined: Oct 6, 2009
    Messages: 1,207
    Likes Received: 41
    Trophy Points: 145
    Hacking, cyber attacks: Top 10 countries

    1. United States
    The United States topped in overall malicious activity measured by Symantec, with 19 percent of the total in 2009. This is a drop from 23 per cent in 2008.
    The United States was the country of the most bot-infected computers observed by Symantec in 2009, accounting for 11 per cent of the global total, a slight decrease from 12 percent in 2008.
    It also topped as the No.1 country of origin for Web-based attacks in 2009, accounting for 34 per cent of the worldwide total.

    Image: US tops in malicious activity.

    2. China
    China is ranked second in the list in terms of bots and origin of most attacks.
    It is ranked sixth in terms of phishing hosts and eighth in terms of spam zombies. China was at the same position last year also.

    3. Brazil
    Brazil became more prominent in all of the specific category measurements in 2009 except for spam zombies, where it was already the top-ranked country.
    Brazil's significant increases across all categories are related to the growing Internet infrastructure and broadband usage there.*
    The growing level of malicious code activity affecting Brazil has also resulted in the proposal of a new cybercrime bill in the country. The initiative may also be a result of a number high-profile cyber attacks there in recent years.
    One of the attacks resulted in a massive power grid blackout, while another resulted in the exposure of valuable data and a $350,000 ransom request after a government website was compromised. The latter case resulted in over 3,000 employees being unable to access the site for 24 hours.

    4. Germany
    Germany ranks second in terms of phishing hosts and third in terms of origin of attacks. In terms of spam zombies, it is ranked 7th and is second in hosting phishing.

    5. India

    India saw a surge in malicious activity in 2009, moving from 11th for overall malicious activity in 2008 to fifth in this period. In 2009, India also accounted for 15 percent of all malicious activity in the Asia-Pacific/Japan (APJ) region, an increase from 10 per cent in 2008.
    For specific categories of measurement in the APJ region, India increased rank in malicious code, spam zombies and phishing hosts from 2008. Its high ranking in spam zombies also contributed to India being the third highest country of spam origin globally.
    Malicious activity tends to increase in countries experiencing rapid growth in broadband infrastructure and connectivity, and the level of malicious activity occurring in India has been increasing steadily over several reporting periods as its broadband infrastructure and user base grows.

    6. United Kingdom
    The United Kingdom has seen a drop in malicious activity. It is ranked 4th in terms of malicious code, origin of attacks and 7th in phishing hosts.

    7. Russia
    Russia which was at 12th place last year has surged to the 7th position. The country is ranked*second in terms of spam zombies, fifth in phishing hosts and*tenth in terms of origin of attacks.

    8. Poland
    Poland has seen a rise in malicious activity. It ranked at No.8, two places higher than last year. The country is ranked fourth in spam zombies, eighth in phishing hosts and bots.

    9. Italy
    Italy has seen a drop in malicious activity. It is now at ninth place from seventh position in 2008. The country is ranked ninth for spam zombies, sixth for bots and eighth in terms of origin of attacks.

    10. Spain
    Spain has also seen a fall in malicious activity. It has fallen to 10th place from sixth last year. It ranks at the 11th position for spam zombies and phishing hosts, seventh for bots and ninth in terms of origin of attacks.
    In 2009, 60 percent of identities exposed were compromised by hacking attacks, which are another form of targeted attack. The majority of these were the result of a successful hacking attack on a single credit card payment processor.

    Read more at ( http://business.rediff.com/slide-show/2010/apr/27/slide-show-1-tech-hacking-top-10-countries.htm )

    Top 10 Infamous Hackers

    In today’s world, technology is definitely the way of doing well…everything. You can watch T.V. online, listen to music online, bank, shop, give yourself a virtual makeover and even order food. As great as technology is, especially computers and the Internet, there are down falls. Some claim that with the invention of the Internet, computers, and television, society as a whole has become lazy, which has lead to many health problems. With everything good there is always something bad, and computers and the Internet are no exception. While you may just love the ‘net for the great conveniences that it provides, others love it because it also offers some conveniences to them, just in a more illegal way.

    Afraid of you having your personal information stolen, your computer nonfunctional, your passwords changed, or a web page of yours taken over by someone else, then look no further than today’s hackers. Below are ten hackers who have made their mark in history.

    10. Eric Corley

    Better known as a pseudonym from George Orwell’s book 1984, Emmanuel Goldstein, Eric Corley was a well-known figure when it came to hacking, especially in the 1980 and 90s. In 1999 he went to court for sharing DeCSS codes and a method to download it, a program that was able to decrypt content on an encrypted DVD. His court case stands as the first to test the Digital Millennium Copyright Act. Corley was told to remove the program from his website. Though the main link was removed, almost 500 other websites had provided their own links to access and download the program. To continue this motion, Corley posted a banner stating that he encouraged mirroring of the link. And even today, you can still easily find the program.
    Now Corley lives in N.Y.C. and hosts a radio show called Off the Hook on WBAI as well as Brain Damage on Stony Brook University’s WUSB. He also runs a magazine named 2600: The Hacker Quarterly that provides information about phreaking and basic hacking. In 2001, he took part in a demonstration against the jailing of Kevin Mitnick (see #1) and in 2004 was arrested for videotaping the demonstration and was charged with disorderly conduct.

    9. Robert T. Morris, Jr

    Best known for a worm named after himself, the Morris worm, Robert T. Morris, Jr. is accredited with creating the first computer worm, not to be confused with the first computer virus. While a computer virus uses other files to replicate itself, a computer worm will utilize other networks in order to spread and infect others. In 1988, the Morris worm was created. To hide his tracks, Morris first set off the virus from MIT, even though he built and released it while a student at Cornell. According to Morris, the main purpose of his worm was to see how many computers were connected to the Internet. However, due to a configuration in the worm, it did a lot more damage than expected. Some of the totals ranged from $20,000 to $530,000. Despite this damage, Morris only had to do community service and was spared jail time.
    Today, Morris is a professor at Massachusetts Institute of Technology teaching in the computer science and electrical engineering field. In the past, despite his record with computer hacking and other illegal activity, he was able to become the chief scientist at the National Computer Security Center. The NCSC is a branch of the National Security Agency.

    8. Nahshon Even-Chaim

    Nahshon Even-Chaim stands as the first person in Australia to be arrested and convicted of computer hacking. Even-Chaim, better known as Phoenix online, was part of a very popular hacking group based out of Australia known as The Realm. Though the internet wasn’t as widely known during the beginning of his hacking reign, Even-Chaim was able to utilize X.25 networks as well as “dialing-in” methods to hack and focused on penetrating networks of defense and nuclear agencies. Eventually the Australian Federal Police caught on and were able to get a warrant to wire-tap his phone and watch all signals coming in and out of his modem.
    In April 1990, Even-Chaim’s home, along with two others, was raided. He was arrested and charged with 48 crimes. However, once his time in court came, he was able to strike a bargain and only had to do a 12 month jail term and 500 hours of community service, opposed to 10 years in jail. Today, Even-Chaim works in the IT field and has delved into music.

    7. Mark Abene

    Online, you’d have known Mark Abene as “Phiber Optik.” Born in New York City, Abene was a well-known member of groups such as Masters of Deception and Legion of Doom. Both of these groups were known for their hacking skills and often times those who took part in the groups would be able to share hacking knowledge with others. Most of the members were eventually caught and investigated by the F.B.I. Abene was no exception. At the young age of 9, Abene was able to access dial-up computers and from there his curiosity grew and he learned numerous computer languages of the time. He was soon introduced to the Legion of Doom as well as the Masters of Deception and during this time he became interested in operating systems as well as telecommunications which enabled him to learn about the hacking technique of phreaking.
    However, soon after joining the group, on January 24, 1990, those who took part in these groups had their homes searched. In 1991, he was formally arrested with computer trespassing and tampering. He took a plea bargain and only had to serve 35 months of community service. In 1997, Abene and other ex-members of the Legion of Doom created Crossbar Security, but the company soon went out of business in 2001. Today Abene works as an independent consultant.

    6. Fred Cohen

    Though not as malicious as most on this list, Fred Cohen is definitely well known in the computer world. Studying to be a computer scientist at University of Southern California’s School of Engineering in 1983, Cohen was able to create the first computer virus. The virus* he created was able to completely overtake a computer and control each one of its functions. His virus allowed other computer scientists to see that not all viruses can be solved by just one commonly used algorithm.
    However, Cohen was also able to create good viruses. As silly as it sounds, he was able to create a virus that did nothing malicious to a computer. After putting the virus on a computer, it went into each executable file (.exe) and made them smaller. He named it the compression virus. Cohen was never jailed because* his efforts were done for* educational purposes. Today he runs a company that provides information security.

    5. Vladimir Levin

    Levin was well known in the 1990s for his hacking efforts which exposed the vulnerability of popular company websites, one of the most notable in this case being Citibank.* Levin, in 1994, was able to access Citibank accounts belonging to various corporate customers. He used the dial-up wire transfer service and was able to successfully transfer the money out of these accounts into accounts located in Israel, Germany, the U.S., Finland, and the Netherlands. Levin had an accomplice at each of these locations. However, 3 of his accomplices were watched as they attempted to withdraw money. They were arrested and all of them gave signs pointing to Levin. In 1995, Levin was arrested.
    By the end of it all, Levin was able to successfully, but fraudulently transfer about $10.7 dollars from Citibank accounts into ones he had set up. In 1997 he was brought to the U.S. and pleaded guilty to conspiracy to defraud as well as stealing $3.7 million. He was put in jail for 3 years and ordered to pay $240,015. Out of all the money that Levin was able to transfers out of Citibank into other banking facilities, only $400,000 was located and recovered. Since the incident Citibank has upped its security, as have many other banking companies that utilize online actions. Today he owns and runs a business in Lithuania.

    4. John Schiefer

    Schiefer is well known for defrauding companies, as well as installing malware to intercept vital information. The malware that Schiefer used was known as “spybots.” These pieces of malware acted as wiretaps and were able to access communications between the infected computer and bank accounts. He then was able to find out usernames, passwords, and other information. From there Schiefer would use the bank accounts to make fraudulent purchases, and would share the information with others. He utilized the same method to infected and gain information from computers with Microsoft operating systems.
    Once arrested, Schiefer was charged with wire and bank fraud, intercepting private information to commit identity theft, and installing malware on dozens of computers in order to retrieve the private information that he needed. He stands as the first person to be charged with using botnets for hacking purposes. In 2009 he was charged and sentenced to four years in prison.

    3. Adrian Lamo

    Known as a grey hat hacker, meaning one who hacks sometimes for good reasons, Adrian Lamo is another hacker that found himself in trouble after the F.B.I was able to probe his illegal actions. Lamo is unique as he never stayed at one location to perform his hacking. He usually lived house to house, couch to couch, and often did a lot of his exploiting and investigating from internet cafes and university libraries. He is well known for exploiting companies such as Microsoft, the New York Times, Lexis-Nexis, and Yahoo!.* Because of his actions, many companies, namely, the New York Times, filed complaints and for 15 months Lamo was investigated by the F.B.I. He eventually realized he was being tracked and went into hiding, but surrendered to the U.S. Marshals on September 9, 2003. He plead guilty in court and was ordered to pay $65,000 and was sentenced to home detention and probation afterward.

    However, Lamo, as a grey hat hacker, did have a good side. He took it upon himself to hack into several different Fortune 500 companies’ websites in order to find security flaws. After finding what he could, he then reported back to the company of what security issues needed to be fixed. While many would get paid for this type of work Lamo never accepted any type of monetary award. Today Lamo is in college working his way towards becoming a top-rated journalist. A documentary, Hackers Wanted, was made depicting Lamo’s life and hacking skills.

    2. Kevin Poulsen

    Poulsen, a black hat hacker, meaning one who hacks for a malicious purpose, is well known for his skills. Also known as Dark Dante, Poulsen is probably best known for his takeover of the KIIS-FM phone lines, a Los Angeles based radio station. At the time, the radio was running a contest. The 102nd caller would possibly win a Porsche 944 S2. With this in mind, Poulsen was able to clog all of the lines, which inevitably would make him the 102nd caller. Once the F.B.I realized Poulsen’s actions, they began to investigate him, but during this time he found ways to keep himself hidden. However, one day on Unsolved Mysteries, Poulsen was one of the many fugitives aired on the show, and during that time, the phone lines crashed. Of course this was Poulsen’s doing. In June 1994 he was finally caught and arrested and charged with wire, mail, and computer fraud, as well as money laundering. He spent about 4 months in jail and had to pay $56,000. Today he works as a senior editor for Wired News.

    1. Kevin Mitnick

    At the age of 12, Mitnick learned the high importance of social engineering. Though this type of hacking doesn’t involve computers, it helps you to gain access to things such as emails, social networking sites, and others, by simply asking the right questions. He used this method to bypass the card system used in the L.A. transit system. In 1979, at the age of 16, Mitnick was able to get access to his first computer network. After years of accessing numbers of networks and private emails, as well as cloning cell phones and using false I.D., Mitnick was arrested in 1995.
    After being arrested, he was charged with evading the F.B.I., wiretapping, computer fraud, hacking into Digital Equipment Corporation systems, taking over a computer at the Computer Learning Center in Los Angeles, and hacking many other systems including Nokia, Motorola, Fujitsu Siemens, and many others. When he was arrested, Mitnick was the most wanted computer hacker in the U.S. His activities cost companies a lot of money. Digital Equipment Corporation alone had to pay $160,000 to clean up the damage Mitnick had done. In 2002 he published a book entitled The Art of Deception: Controlling the Human Element of Security in which he talks all about his experiences and how he did it. Today he owns a company that offers security consulting.

    Read more: Top 10 Infamous Hackers | Top 10 Lists | TopTenz.net