What's new

Cyber warfare data collection.

BHarwana

MODERATOR
Joined
Sep 24, 2016
Messages
24,827
Reaction score
20
Country
Pakistan
Location
Pakistan
I am starting this thread based on cyber war. Cyber war is a detailed topic which has many sub topics. The main classes of cyber war are. Launching Cyber war and Prevention of Cyber war. This will be long writing and will take several days to complete. Informed members please feel free to contribute and please don't troll the thread in one way or other this thread will help you.

I will provide all the info I have on the issue but there are much more informed people here so please make your positive contribution. There are few dangerous aspects of this topic and I will not write on those aspects but will provide limited info. As that info should not be shared.
 
@Horus shall I continue with this thread?
 
Last edited:
As in an educational article you will write to inform members of cyberwarfare/data mining?
 
As in an educational article you will write to inform members of cyberwarfare/data mining?
Yes it will be an educational thread. Data collection is mentioned because this thread will be mostly a rough draft and discussion some MOD will have to rearrange it to make the info more accessible in the end.
 
Cyber warfare

1. Hacking

Basic Background....

This is a complex topic so I will start with simple basics and reasons to this and then climb up the mountain.

Hacking is a word many know but still a myth as many have not experienced being hacked or have not realized they have been hacked.

In layman's terms it is just like sneaking up on your younger brother when he is typing his pin in his cell phone and then accessing that cell phone when he is away from it.

To prove that hacking is not a myth and actually happens I have a simple argument. You all know a company called Microsoft and it's software product called "Windows" I will assume most of you have used it and not move to very basics. Now when you install Windows on your machine it comes with a built in protection called "windows defender" or (win defender) even though they have this protection but still the software will advise you to get a third party protection continuously. "Update spyware protection (Important)" and "Update virus protection (Important)". Now the question: Why one of the richest companies in business is advising you to get a third party protection and not promoting it's own protection as being the best.

Answer: Because even Microsoft knows that there is no protection from hacker and they just tell you to pay some else to take the blame if you are hacked. The Third party software help to protect you to some extent but not totally secures you.
 
Hacking in higher terms is making a computer program do something it was not intended to do, accessing data in a way it was not meant to be accessed, altering data in a way that should not have been possible thus bypassing the defined input/output functions that have been set by the developer, or exploiting the shortcomings/exploits in the programming language that was used to develop the program, operating system, network etc. The list goes on.

Good luck with this education, but from my experience explaining this to people without IT background is quite difficult.
 
Good luck with this education, but from my experience explaining this to people without IT background is quite difficult.

I 100% agree that is why I am trying to keep my vocabulary non technical and much simple. Explaining hacking is just one part I will also provide the info on conducting social cyber war and how it effects peoples opinion and it is done and how to recognize it. it will also include disinformation campaigns.
 
Hackers prospective:

In this section I will explain about what a hacker needs to do to hack a single individual and then expand my explanation on what and how hackers will generate a country level cyber attack.

For a hacker he needs a certain information to make a successful hack attempt. Every machine or system has different coding and different exploits that can be used to hack it. I will focus on Windows Mac and smart phone with Android and IOS.

Now what info hacker needs before he executes a successful hack.

He needs to your operating system.
He needs to information about your hardware system.
He needs to know what type of software security you have.
He needs to know what type of browser you use.
He needs to know type of installed software on your system.

Now why hacker needs all this info?

He needs this info to make a successful hack or attempt for an available back door.
Like if you have windows system the tools required for windows are different than the tools required to hack a Mac system. Tools for Android phone are different from those of IOS. You need different tools for Linux and so on.
 

Pakistan Affairs Latest Posts

Back
Top Bottom