Refers to 'hacking with / for a cause'.
*
Comprises of hackers with a social or political agenda
*
Aims at sending across a message through their hacking activity and gaining visibility for their cause and themselves.
*
Common targets include government agencies, MNCs, or any other entity perceived as 'bad' or 'wrong' by these groups / individuals.
*
It remains a fact however, that gaining unauthorized access is a crime, no matter what the intent.
Most hacktivists aim at sending across a message through their hacking activity and gaining visibility for their cause and themselves. Common targets include government agencies, MNCs, or any other entity perceived as 'bad' or 'wrong' by these groups / individuals. It remains a fact however, that gaining unauthorized access is a crime, no matter what the intent.
Saturday, 26 February 2011
// //
0
comments
//
0 comments to "Hacktivism"
Total Pageviews
Blog Archive
-
▼
2011
(43)
-
▼
February
(28)
-
▼
Feb 26
(19)
- Anonymizers- Make your web surfing anonymous
- What is Proxy?
- Cheops-Network management tool-equivalent of a Swi...
- Passive Fingerprinting
- Active Stack Fingerprinting: This technique is cal...
- Tool: Super Scan - Port scanner
- Tool: Net Scan Tools Pro
- Ethical Hacker and Scanning Tools
- What is Nslookup?
- Footprinting - Attack Methods
- What is Footprinting?
- Hacker Classes - Black hats, White Hats, Gray Hats,
- Hacking Phase 5 - Covering Tracks
- Hacking Phase 4 - Maintaining Access
- Hacking Phase 3 - Gaining Access - The hacker expl...
- Hacking Phase 2 - Scanning
- Hacking Phase 1 - Reconnaissance
- Hacktivism
- What do Ethical Hackers do?
-
▼
Feb 26
(19)
-
▼
February
(28)



Post a Comment