Net Security & Encoding/Decoding Algorithms Explained

  • Thread starter Thread starter chaoseverlasting
  • Start date Start date
  • Tags Tags
    Hacking
Click For Summary

Discussion Overview

The discussion revolves around net security, encoding and decoding algorithms, and data compression techniques. Participants explore the relationship between these concepts, particularly in the context of hacking and information transmission over the web.

Discussion Character

  • Exploratory
  • Debate/contested
  • Technical explanation

Main Points Raised

  • Some participants inquire about the nature of net security and the differences between hacking and cracking.
  • There is a discussion on the types of compression: lossy versus lossless, with examples provided for each.
  • One participant explains that compression works by identifying and reducing redundancies in data, such as repeating patterns.
  • Another participant emphasizes that video compression and web data transmission operate independently, highlighting the inherent redundancies in various forms of information.
  • Concerns are raised about the methods used by hackers, including brute force attacks and the use of viruses or Trojan horses to exploit vulnerabilities.
  • Some participants express skepticism about the effectiveness of common security measures and discuss personal experiences with computer protection.
  • There is a mention of the complexities involved in breaking encryption, particularly with strong algorithms like 128-bit encryption.
  • Participants share links to external resources for further reading on compression and cryptography.

Areas of Agreement / Disagreement

The discussion contains multiple competing views regarding the relationship between compression techniques and net security, as well as differing opinions on hacking methods and security practices. No consensus is reached on these topics.

Contextual Notes

Participants express uncertainty about the specifics of how information is transferred over the web and the technical details of encoding and decoding algorithms. There are also limitations in the understanding of the relationship between hacking techniques and data compression.

  • #31
this should go to philosophy forum
 
Technology news on Phys.org
  • #32
Just to add a bit more information to this topic, there are two types of hackers: Whitehats and Blackhats. (mainly) Whitehats are the hackers who hack in order to secure a system, first by exploiting it then by patching it. A Blackhat is a hacker who exploits a system and takes advantage of it by malicious means (virii, trojans, rootkits, etc.), otherwise known as a cracker. Aside from Whitehats and Blackhats, there are script kiddies and lamers. Script kiddies are the, usually, 10 year old kids who are to lame to learn about computers, the net, and the interworkings of things, and they just run some perl scripts or type in some google hacks (code that you type into google that let's you retrieve 'special' results, like inline:"hello" will find webpages with hello in their title) and deface a website. The lamers are people who read up on hacking, say they hack, but actually don't do anything at all, which in my opinion are the worst of them all.

Now to answer the question about hacking and the internet. Hackers use many techniques(sp). One technique is Brute Force/Dictionary Attacks and are used to crack into a website by testing multiple combinations of usernames and passwords, till one works. Another technique is SQL Injection and Cross Site Scripting. Other techniques include buffer overflows, injecting low level code (assembler/assembly) into a kernel, and just plain old telneting to a box and cracking the hash file. A hacker must learn a variety of information such as perl, C++, assembly, php, sql, kernel programming, unix, linux, windows xp and 2000 mainly, solaris (sometimes), ports, commands, file architecture, networking (packets, cookies, DNS, ARP posioning), encryption (Triple DES, Blowfish, Twofish, Serpent, Hash), and much much more.
 

Similar threads

Replies
4
Views
2K
  • · Replies 1 ·
Replies
1
Views
3K
  • · Replies 6 ·
Replies
6
Views
4K
Replies
4
Views
2K
  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 3 ·
Replies
3
Views
3K
Replies
5
Views
2K
  • · Replies 6 ·
Replies
6
Views
2K
Replies
5
Views
3K
  • · Replies 56 ·
2
Replies
56
Views
8K