Pages


Education is both a tool of social justice as well as a fundamental driver of economic development.

Wednesday, July 6, 2011

How Hackers Work

The term computer hacker first showed up in the mid-1960s. A hacker was a programmer -- someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what computers could do and created ways to achieve that potential.
Hackers from around the world gather at camps to
practice their hobby and trade tips.
A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug -- a section of bad code that prevented the program from working properly -- hackers would often create and distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they'd happily do for free.
As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning -- a person using computers to explore a network to which he or she didn't belong. Usually hackers didn't have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.­
­­In fact, that's still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious -- they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments construct better security measures. Others might use their skills for more unethical endeavors.

The Hacker Toolbox

The main resource hackers rely upon, apart from their own ingenuity, is computer code. While there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people. There are thousands of different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations -- once a skilled hacker knows how a system works, he can design programs that exploit it.
Malicious hackers use programs to:
  • Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. Once installed on a victim's computer, the programs record each keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone's identity.
  • Hack passwords: There are many ways to hack someone's password, from educated guesses to simple algorithms that generate combinations of letters, numbers and symbols. The trial and error method of hacking passwords is called a brute force attack, meaning the hacker tries to generate every possible combination to gain access. Another way to hack passwords is to use a dictionary attack, a program that inserts common words into password fields.
  • Infect a computer or system with a virus: Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system's hard drive. A hacker might install a virus by infiltrating a system, but it's much more common for hackers to create simple viruses and send them out to potential victims via email, instant messages, Web sites with downloadable content or peer-to-peer networks.
  • Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. In the early days of the Internet, many computer systems had limited security, making it possible for a hacker to find a pathway into the system without a username or password. Another way a hacker might gain backdoor access is to infect a computer or system with a Trojan horse.
  • Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes seemingly innocent code, a connection opens between his computer and the hacker's system. The hacker can secretly control the victim's computer, using it to commit crimes or spread spam.
  • Spy on e-mail: Hackers have created code that lets them intercept and read e-mail messages -- the Internet's equivalent to wiretapping. Today, most e-mail programs use encryption formulas so complex that even if a hacker intercepts the message, he won't be able to read it.
 Source: How Stuff Works

26 Young Rich Entrepreneur Under 30 Years Old

Do you know the successful young rich entrepreneur under 30 years old? Here is the list :

No.) Name                                | Website Name   | Age             | Annual Turnover
01) Mark Zuckerberg                  | Facebook            | 23 years old | $700M
02) Andrew Gower                     | Runescape           | 28 years old | $650M
03) Blake Ross and David Hyatt  | Mozilla                | 22 years old | $120M
04) Chad Hurley                          | Youtube              | 30 years old | $85M
05) Angelo                                  | Deviant ART       | 26 years old | $75M
06) John Vechey                          | PopCap Games  | 28 years old | $60M
07) Alexander Levin                    | WordPress          | 23 years old | $57M
08) Jake Nickell                          | Threadless          | 28 years old | $50M
09) Sean Belnick                         | Biz Chair            | 20 years old | $42M
10) Kevin Rose                           | Digg                   | 30 years old | $31M
11) Ryan Block                           | Engadget            | 25 years old | $20M
12) Aodhan Cullen                      | Stat Counter       | 24 years old | $18M
13) Tom Fulp                              | Newgrounds       | 29 years old | $15M
14) Rishi Kacker and Matt Pauker | Voltage           | 24 years old | $12M
15) Markus Frind                        | Plenty of Fish     | 29 years old | $10M
16) Catherine and David Cook    | My Year Book   | 17 & 19 years old | $10M
17) Fredrik Neij                          | The Pirate Bay    | 28 years old | $10M
18) David Hauser & Siamak Taghaddos | GotvMail | 24 years old | $8M
19) Jermaine Griggs                      | Hear and Play     | 23 years old | $5M
20) Jay Westerdal                         | Domain Tools     | 29 years old | $5M
21) Ashley Qualls                         | What Ever Life    | 17 years old | $3M
22) Mario Lavandeira                   | Perez Hilton        | 29 years old | $3M
23) Ben Way                                | Rain Makers       | 27 years old | $2.2M
24) Alex Tew                               | Million Dollar Homepage | 22 years old | $1.6M
25) Rob Benwell                          | Blogging to the Bank | 23 years old | $1.2M
26) Matt Wegrzyn                        | Bodis                  | 19 years old | $1M

Source : Blogging Secret

Tuesday, July 5, 2011

How to Effectively Communicate Value When Building a Business

Ever talk to a business owner or an entrepreneur about their business and they were not able to effectively explain what their business did?  Maybe they went on and on trying to describe it and the explanation was simply not very clear. Or the explanation was clear, but there was not a real punch in terms of making a strong impression. When this is the case, these business owners could benefit by improving their ability to effectively communicate the value that they deliver to their customers.

What is value?
Value in this context refers to a business benefit that is transferred to the customers or clients that purchase the products or services. Not to be confused with features and benefits of products that are sold, this is actual improvement that results on the customer’s side at the business level.
For example, take a company that sells web-based training software. The features of this software are that it is completely delivered as software-as-a-service with robust recording and delivery options. A main benefit of this software is the ability to deliver education to anyone that has an internet connection. But the value that this business provides is that it helps its clients to effectively and efficiently train their employees leading to a better workforce.

Why is communicating value important?
Effectively communicating value is important because when we talk with prospects, investors, potential business partners, etc., we need to not only communicate what we do concisely, in a brief period of time, but we also need our message to be as powerful as possible. And while you might understand your product’s features and benefits and they may excite you, the main thing your potential customers care about is how you can help their businesses to decrease cost and increase revenue. Effectively communicating value will provide this information.

Identifying the Core Value
Some business owners may know the value they offer right off the bat. Others may find themselves stuck somewhere between summarizing features and benefits. When this is the case, below is a process that can be used to try to identify the core value that the business offers.

1. Outline features: Summarize or outline the key features of the products or services that are offered.
2. Outline benefits: Take the features that are outlined and build a list of the benefits that those features produce.
3. Summarize benefits: Summarize the benefits provided into a concise summary of the improvements gained.
4. Convert to a business standpoint: Convert over the summarized benefit to what it means from a business standpoint.

Producing a Value Statement
Once the core value is identified, we can produce a value statement. A value statement is a one to two sentence summary of the value that you provide. By having a value statement, we can then have that have that ready to be delivered whenever we meet with potential clients or business partners. Whether  we someone in person, make a cold call, or start to build any of our marketing deliverables, when we begin to explain what we do, we can go directly to the value statement and hopefully if built correctly, it will clearly explain what we do in a powerful way.