Hacker Jargon

Hacking jargon (hacking terminology) that you will need to know if you are working through these articles.

Hacking Some believe that hacker means a skilled and enthusiastic programmer and that a 'cracker' is someone that breaks into system. In the sense that we will use hacking, 'hacking' means using computers to gain unauthorized access to data.
Penetration Testing Penetration Testing is when a company ask you to try to hack into their system. They sometimes want to do this to see if their system is secure, and if it is not (if you succeed), they want a report on how you managed to get into their system.
White Hat A 'White Hat' is a good hacker doing only ethical hacking. Usually only legal hacking. Examples would be to someone working for the authorities or a person doing Penetration Testing for a company.
Black Hat A black hat is a 'bad' hacker. Using his skills for criminal activities in order to make money, and if they do hack for fun, they don't care about people's privacy or what damage they cause.
Grey Hat A Grey Hat is a hacker that is sometimes willing to cross the line and do a bit of illegal hacking if he can morally justify what he is doing. For example someone doing an investigation (PI). He will get the information needed for the investigation but sill respect people's privacy.
Hacktivist A person who gains unauthorized access to computer files or networks in order to further social or political ends.
Target The person you want to monitor.
Social Engineering Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.
Con A con is a confidence trick. You trick someone into winning their confidence so that you can get them to divulge information or perform a task like opening an attachment. A con is part of a social engineering attack.
Payload In computer security, payload refers to the part of malware which performs a malicious action. In redpill Hacker, the payload is attached to an email or a website and is delivered to the target PC. The payload will then secretly install the spy software
Phishing The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.
Spear Phishing Spear Phishing is a more targeted attack. The attacker first spend some time finding information about the target. When the phishing email is then sent to the target, it contains a lot of personal information about the target – giving the target a sense of familiarity and trust.
Key Logger A key logger is a spy program that is installed that will hook onto the keyboard and secretly record everything that is typed in every application. The key logger program runs undetected in the background and will usually send the log of keys to the hacker.

For more help, also see these articles:

Remotely install a spy program
Hack in the Dark
Hacker Jargon
How to use Social Engineering to hack
More about payloads and attaching spy programs.
How Anti-Virus detection work and how to bypass it.
Insalling a Payload from a website
Password Phishing Websites
Hacker Videos
redpill Hacker - Penetration Testing Software
Purchase redpill Hacker