Q&A</li></li></ul><li>This information provided would be purely for academic purposes only! This info is not to be abused!<br />I am not responsible for any damage that you may create!<br />I do not promote or encourage any kind of hacking(unethical).<br />You implement the information given at your own risk.<br />
# information.security<br /><ul><li>Information Security - protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.
# Hacking – curiosity to gain knowledge<br />Person who is a geek , computer freak and loves exploring every bit of it.<br />Hacker<br />Hacker using his knowledge for illegal purpose and crime.<br />Cracker<br />Act of hacking performed on the backdrop of social or patriotic motive.<br />Hacktivism<br />
Once the target has been attacked, the control over the machine has to be maintained…<br />Techniques to evade detection<br />Rootkits,<br />Backdoors,<br />Hidden files <br /># man maintaining.access<br />
System is hacked , but you shouldn’t get caught.<br />Clearing evidence and proofs…<br />Clearing logs<br />Disabling auditing<br /># man covering.tracks<br />