Hacker Hacks: a work in progress

A is for ASCII

ASCII is the technical term for the text we see every day on the internet. ASCII art is a graphic design technique using computers to create text based visual images. Pictures created out of letters, number and punctuation marks. 

A is for ascii v2.jpg
b is for box.jpg

B is for box

Did you know that the hacker word for a computer is a box?


C is for connection

C is for secure internet connection, saying NO to cookies and good chatroom etiquette!

A little bit of hacker housekeeping everyday will help keep cyber security issues at bay...

  • Avoid public wifi - somebody might perform a ‘man in the middle’ attack even on VPN (a virtual private network)

  • If you are asked to consent to cookies, find the reject button. The content will usually still be visible. 

  • Using all capital letters in a chatroom is seen as SHOUTING.

C is for connection.jpg
D is for dark web.jpg

D is for dark web

What we see of the internet everyday is just the tip of the iceberg.

The deep web is vast and is estimated to be up to 500 times larger than the internet  we use everyday and is made up of contents that are not indexed by standard web search engines.

The dark web is a small, hidden portion of the deep web only accessed using special software such as TOR (The Onion Router.) The dark web offers anonymous browsing  and bypasses internet censorship making a place of nefarious and illegal activity.


E is for encryption

Encryption is the process of taking plain text and scrambling it into an unreadable format called cipher text. This adds protection to digital data stored on computer systems or transmitted through a network like the Internet.

E is for encryption.jpg
f is for forensics.jpg

F is for forensics

If a cyber crime has been committed a digital fingerprint is left. If investigated, the forensic process will try and retrieve information and messages from a device such as a mobile telephone, computer or server.


G is for glitch

A glitch or bug is an error in a computer’s software program. Most are harmlessly annoying but they can be used by hackers. Did you know that you can earn money from spotting glitches? Bug bounty programs are increasingly used by companies to pay for information about bugs before they can be taken advantage of.

g is for glitch.jpg
H is for hat.jpg

H is for hat

H is for hat. Different types of hackers are denoted by three main colours of hats: white, grey and black. (There are also green, red and blue hat hackers.)

White Hat Hackers are also known as ethical hackers. They follow a strict set of rules, laws and code of ethics and use their abilities for benevolent activities to help individuals, companies and charities to operate more securely. White hat hackers are often employed by corporations and financial institutions to identify weaknesses in security systems.

A Grey Hat Hacker’s morals have grey areas. They make up the majority of the hacking community. A grey hat hacker is unlikely to steal credit card details from an individual but might steal from institutions that can afford the loss.

Black Hat Hacker’s hack for malicious intent to exploit weakness in security systems of large corporations and banks to steal confidential data and money. They are also known as ‘crackers’


I is for infosec

You can’t always trust a cloud not to rain. .. Infosec is an abbreviation of ‘Information Security’ more commonly known as cyber security.

Cyber security awareness is vital in mitigating the risk of attacks either personally or in the workplace from black hat hacker cyber threats.

Protect your data. 

  • Use complex passwords and password managers.

  • Update software immediately when notified.

  • Skip Facebook quizzes that give information that could be used to answer security questions.

I is for infosec.jpg
j is for jailbreak.jpg

J is for jailbreak

J is for jailbreak the process of circumventing the security of a device like an iphone or a Playstation to remove manufactures restrictions with the aim to make it run non-official source software.


K is for /<-rad

In hacker lexicon and language /<-rad means cool! awesome! amazing!

For more hacker and 'leet' terminology visit https://www.gamehouse.com/blog/leet-speak-cheat-sheet/

K is for K-rad.jpg
l is for linux.jpg

L is for Linux

Linux is an open-source, Unix-like, operating system. An operating system is software that manages all the hardware resources  you use on your computer. 

Linux was released on 17th September 1991 by Linus Torvalds as is responsible for the running of many systems globally from your mobile phone to your fridge and most of the internet!


M is for malvertising

Malvertising is the use of advertising to spread malware. Online adverts laden with malware are injected into legitimate webpages and online advertising networks. Malvertising is attractive as a cyber attack as it provides opportunity to target web-users  who might not see ads due to firewalls and other anti-malware  programs.

m is for malvertising.jpg
n is for nonce.jpg

N is for nonce

In a 'hacking' context 'nonce' is not a derogatory term - it is a  portmanteau of NUMBER and ONCE and means "a number only used once." It is a system generated string of numbers to identify a user for a one-time-use session or for a particular task. 


O is for open source

Open source software (OSS) has original source code that is released under a license in which the copyright holder grants programmers the right to use, modify and redistribute as they wish to anyone for any purpose.

OSS is highly reliable. Usually thousands of expert developers  work on making and constantly improving it. However, open source security vulnerabilities are an extremely lucrative opportunity for hackers. Once a weakness is discovered the details on how to carry out the exploit are made public. Thus providing black hat hackers all the information required to carry out an attack.

o is for opens ource.jpg