Hacking book in arabic

50 %
50 %
Information about Hacking book in arabic
Technology

Published on April 6, 2014

Author: cherradi1

Source: slideshare.net

Description

Hacking book in arabic

١ ‫ﰲ‬ ‫ﺃﻗﺴﺎﻡ‬ ‫ﻋﺪﺓ‬ ‫ﺇﱃ‬ ‫ﻣﻘﺴﻢ‬ ‫ﻫﺬﺍ‬ ‫ﻟﻜﺘﺎﺏ‬‫ﺍ‬ ‫ﻭﻃﺒﻌﺎ‬ ‫ﺍﳍﻜﺮ‬ ‫ﻋﺎﱂ‬ ‫ﺇﱃ‬ ‫ﻟﻴﺪﺧﻞ‬ ‫ﻳﻄﻤﺢ‬ ‫ﺷﺨﺺ‬ ‫ﻟﻜﻞ‬ ‫ﻳﻪ‬‫ﺪ‬‫ﺍﻫ‬ ‫ﻟﻜﺘﺎﺏ‬‫ﺍ‬ ‫ﻫﺬﺍ‬ ‫ﺍﳍﻜﺮ‬ ‫ﻋﺎﱂ‬ ‫ﰲ‬ ‫ﻣﻬﻤﺔ‬ ‫ﻭﻣﺼﻄﻠﺤﺎﺕ‬ ‫ﺷﺎﻣﻠﺔ‬ ‫ﻣﻌﻠﻮﻣﺎﺕ‬ ‫ﻋﻦ‬ ‫ﻋﺒﺎﺭﺓ‬ ‫ﻭﻫﻲ‬ ‫ﺍﳌﺒﺘﺪﻯ‬ ‫ﺍﳍﻜﺮ‬ ‫ﺧﺎﺹ‬ ‫ﺩﺭﺱ‬ ‫ﻳﺔ‬‫ﺍ‬‫ﻟﺒﺪ‬‫ﺍ‬ ‫ﻋﻦ‬ ‫ﺩﺭﺱ‬ ‫ﻟﻚ‬‫ﺫ‬ ‫ﺑﻌﺪ‬ ‫ﺛﻢ‬ ‫ﻭﺍﻻﺧﱰﺍﻕ‬‫ﺍﻵﻱ‬‫ﻭﲢﻠﻴﻠﻪ‬ ‫ﲨﻌﻪ‬ ‫ﻭﻃﺮﻕ‬ ‫ﺑﻲ‬‫ﻭﺃﳘﻴﺘﻪ‬‫ﺍﻻﺧﱰﺍﻕ‬ ‫ﻋﺎﱂ‬ ‫ﰲ‬‫ﻟﺪﺧﻮﻝ‬‫ﺍ‬ ‫ﺛﻢ‬ ‫ﻧﺎﺕ‬‫ﻮ‬‫ﻟﱰﻭﺟ‬‫ﺍ‬ ‫ﺷﺮﺡ‬ ‫ﻳﺔ‬‫ﺍ‬‫ﻟﺒﺪ‬‫ﺍ‬ ‫ﻭﰲ‬ ‫ﺍﳍﻜﺮ‬ ‫ﻋﺎﱂ‬ ‫ﺇﱃ‬ ‫ﺍﳊﻘﻴﻘﻲ‬‫ﻭﺇﻋﺪﺍﺩ‬‫ﺑﺮﺍﻣﺞ‬ ‫ﺷﺮﺡ‬ ‫ﺛﻢ‬ ‫ﻟﺘﺒﻠﻴﻎ‬‫ﺍ‬ ‫ﻟﻄﺮﻕ‬ ‫ﺷﺮﺡ‬ ‫ﺛﻢ‬ ‫ﻟﺴﲑﻓﺮ‬‫ﺍ‬ ‫ﻟﻌﻤﻴﻞ‬‫ﺍ‬....‫ﻭﻃﺮﻕ‬ ‫ﻟﺘﺸﻔﲑ‬‫ﺍ‬ ‫ﻋﺎﱂ‬ ‫ﺇﱃ‬ ‫ﻧﺪﺧﻞ‬ ‫ﺭﺍﺡ‬ ‫ﻧﻲ‬‫ﺎ‬‫ﻟﺜ‬‫ﺍ‬ ‫ﺍﳉﺰﺀ‬ ‫ﰲ‬ ‫ﺍ‬ ‫ﺷﺎﺀ‬ ‫ﻭﺍﻥ‬ ‫ﺍﻷﻭﻝ‬ ‫ﺍﳉﺰﺀ‬ ‫ﻫﺬﺍ‬ ‫ﻃﺒﻌﺎ‬ ‫ﺛﻢ‬ ‫ﻳﺔ‬‫ﺎ‬‫ﺍﳊﻤ‬ ‫ﺑﺮﺍﻣﺞ‬ ‫ﻋﻦ‬ ‫ﻟﺴﲑﻓﺮ‬‫ﺍ‬ ‫ﻹﺧﻔﺎﺀ‬ ‫ﻟﻘﻴﻢ‬‫ﺍ‬ ‫ﰲ‬ ‫ﻟﺘﻼﻋﺐ‬‫ﺍ‬‫ﻃﺮﻕ‬ ‫ﻧﺸﺮﺡ‬‫ﺇﺭﺳﺎﻝ‬‫ﺑﻔﻦ‬ ‫ﻟﺒﺎﺗﺶ‬‫ﺍ‬‫ﻭﻣﻬﺎﺭﺓ‬‫ﻳﻀﺎ‬‫ﺃ‬‫ﻭ‬‫ﻃﺮﻕ‬ ‫ﻟﻼﺧﱰﺍﻕ‬‫ﺍﻷﻣﻨﻴﺔ‬ ‫ﻟﺜﻐﺮﺍﺕ‬‫ﺍ‬ ‫ﻳﻖ‬‫ﺮ‬‫ﻃ‬ ‫ﻋﻦ‬   •‫؟‬ ‫اﻟﺘﺠﺴﺲ‬ ‫أو‬ ‫اﻟﮭﺎﻛﯿﻨﺞ‬ ‫ﻋﻤﻠﯿﺔ‬ ‫ھﻲ‬ ‫ﻣﺎ‬ ‫ﺗﺴﻤ‬‫ﻰ‬‫اﻻﺧﺘﺮاق‬‫ﺑﺎ‬‫ﻹﻧﺠﻠﯿﺰﯾﺔ‬)Hacking.. (‫اﻻﺧﺘﺮاق‬ ‫أو‬ ‫اﻟﺘﺠﺴﺲ‬ ‫ﻋﻤﻠﯿﺔ‬ ‫اﻟﻌﺮﺑﯿﺔ‬ ‫ﺑﺎﻟﻠﻐﺔ‬ ‫وﺗﺴﻤﻰ‬.. ‫اﻟ‬ ‫اﻷﺷﺨﺎص‬ ‫أﺣﺪ‬ ‫ﯾﻘﻮم‬ ‫ﺣﯿﺚ‬‫ﻏﯿﺮ‬ ‫وﻷﻏﺮاض‬ ‫ﺷﺮﻋﯿﺔ‬ ‫ﻏﯿﺮ‬ ‫ﺑﻄﺮﯾﻘﺔ‬ ‫ﺟﮭﺎزك‬ ‫ﻓﻲ‬ ‫اﻟﺘﺸﻐﯿﻞ‬ ‫ﻧﻈﺎم‬ ‫إﻟﻰ‬ ‫ﺑﺎﻟﺪﺧﻮل‬ ‫ﻟﮭﻢ‬ ‫ﻣﺼﺮح‬ ‫ﻐﯿﺮ‬ ‫اﻟﻤﺘﺠﺴﺲ‬ ‫ﻟﻠﺸﺨﺺ‬ ‫ﯾﺘﺎح‬ ‫ﺣﯿﺚ‬ ‫اﻟﺘﺨﺮﯾﺐ‬ ‫أو‬ ‫اﻟﺴﺮﻗﺔ‬ ‫أو‬ ‫اﻟﺘﺠﺴﺲ‬ ‫ﻣﺜﻞ‬ ‫ﺳﻮﯾﺔ‬)‫اﻟﮭﺎﻛﺮ‬(‫أو‬ ‫ﻣﻠﻔﺎت‬ ‫ﯾﻀﯿﻒ‬ ‫أو‬ ‫ﯾﻤﺴﺢ‬ ‫أو‬ ‫ﯾﻨﻘﻞ‬ ‫أن‬ ‫أﻣ‬ ‫إﻋﻄﺎء‬ ‫ﻣﺜﻞ‬ ‫أواﻣﺮ‬ ‫ﺑﺈﺻﺪار‬ ‫ﻓﯿﻘﻮم‬ ‫اﻟﺘﺸﻐﯿﻞ‬ ‫ﻧﻈﺎم‬ ‫ﻓﻲ‬ ‫ﯾﺘﺤﻜﻢ‬ ‫أن‬ ‫ﺑﺈﻣﻜﺎﻧﮫ‬ ‫أﻧﮫ‬ ‫ﻛﻤﺎ‬ ‫ﺑﺮاﻣﺞ‬‫اﻟﺘﺨﺰﯾﻦ‬ ‫أو‬ ‫اﻟﺘﺼﻮﯾﺮ‬ ‫أو‬ ‫اﻟﻄﺒﺎﻋﺔ‬ ‫ﺮ‬..

٢ •‫؟‬ ‫اﻟﮭﺎﻛﺮز‬ ‫ھﻢ‬ ‫ﻣﻦ‬ ‫اﻟﺘﻠﺼﺺ‬ ‫أو‬ ‫ﺟﮭﺎزك‬ ‫ﺗﺪﻣﯿﺮ‬ ‫أو‬ ‫ﺳﺮﻗﺘﮭﺎ‬ ‫أو‬ ‫ﻣﻠﻔﺎت‬ ‫ﻣﻦ‬ ‫ﺑﮫ‬ ‫ﻣﺎ‬ ‫ﻣﺸﺎھﺪة‬ ‫ﻓﯿﺴﺘﻄﯿﻌﻮن‬ ‫ﺟﮭﺎزك‬ ‫ﯾﺨﺘﺮﻗﻮن‬ ‫اﻟﺬﯾﻦ‬ ‫اﻷﺷﺨﺎص‬ ‫ھﻢ‬ ‫ﺷﺒﻜﺔ‬ ‫ﻋﻠﻰ‬ ‫ﺗﻔﻌﻠﮫ‬ ‫ﻣﺎ‬ ‫وﻣﺸﺎھﺪة‬‫اﻹﻧﺘﺮﻧﺖ‬.. ‫اﻻﺧﺘﺮاق‬:‫أﻧﻮاﻋﮫ‬‫ودواﻓﻌﮫ‬*** **‫ﺗﻌﺮﯾﻒ‬‫اﻹﺧﺘﺮاق‬** ‫اﻹﺧﺘﺮ‬‫ﻋﺎم‬ ‫ﺑﺸﻜﻞ‬ ‫اق‬‫ﻣﺸﺮوﻋﺔ‬ ‫ﻏﯿﺮ‬ ‫ﺑﻄﺮﯾﻘﺔ‬ ‫ﻣﻌﯿﻦ‬ ‫ﻟﮭﺪف‬ ‫اﻟﻮﺻﻮل‬ ‫ﻋﻠﻰ‬ ‫اﻟﻘﺪرة‬ ‫ھﻮ‬‫ﻧﻈﺎم‬ ‫ﻓﻲ‬ ‫ﺛﻐﺮات‬ ‫ﻃﺮﯾﻖ‬ ‫ﻋﻦ‬‫اﻟﺤﻤﺎﯾﺔ‬ ‫ﺳﯿﺌﺔ‬ ‫ﺳﻤﺔ‬ ‫ھﻲ‬ ‫اﻟﺤﺎل‬ ‫وﺑﻄﺒﯿﻌﺔ‬ ‫ﺑﺎﻟﮭﺪف‬ ‫اﻟﺨﺎص‬‫ﻟﻘﺪرﺗﮫ‬ ‫اﻟﻤﺨﺘﺮق‬ ‫ﺑﮭﺎ‬ ‫ﯾﺘﺴﻢ‬‫أﺟﮭﺰة‬ ‫دﺧﻮل‬ ‫ﻋﻠﻰ‬‫اﻵﺧﺮﯾﻦ‬‫رﻏﺒﺔ‬ ‫ودون‬ ‫ﻋﻨﻮه‬ ‫ﻣﻨﮭﻢ‬‫اﻟﻨﻈﺮ‬ ‫ﺑﻐﺾ‬ ‫ﻣﻨﮭﻢ‬ ‫ﻋﻠﻢ‬ ‫دون‬ ‫وﺣﺘﻰ‬‫ﯾﺤﺪﺛ‬ ‫ﻗﺪ‬ ‫اﻟﺘﻲ‬ ‫اﻟﺠﺴﯿﻤﺔ‬ ‫اﻷﺿﺮار‬ ‫ﻋﻦ‬‫ﺳﻮاء‬ ‫ﮭﺎ‬‫اﻟﺸﺨﺼﯿﺔ‬ ‫ﺑﺄﺟﮭﺰﺗﮭﻢ‬‫أو‬‫ﻋﻨﺪ‬ ‫ﺑﻨﻔﺴﯿﺎﺗﮭﻢ‬ ‫وﺣﺪھﻢ‬ ‫ﺗﺨﺼﮭﻢ‬ ‫وﺻﻮر‬ ‫ﻣﻠﻔﺎت‬ ‫ﺳﺤﺒﺔ‬.‫ﻣﺎ‬‫اﻟﺸﺨﺼﯿﺔ‬ ‫ﻟﻸﺟﮭﺰة‬ ‫اﻟﻤﺨﺘﺮق‬ ‫ﺑﯿﻦ‬ ‫ھﻨﺎ‬ ‫اﻟﻔﺮق‬‫؟؟‬ ‫اﻵﻣﻨﮫ‬ ‫اﻟﻤﻄﻤﺌﻨﺔ‬ ‫ﻟﻠﺒﯿﻮت‬ ‫واﻟﻤﻘﺘﺤﻢ‬ ‫أراءﯾﺘﻢ‬‫دﻧﺎءة‬‫اﻹﺧﺘﺮاق‬‫وﺣﻘﺎرﺗﮫ‬. *‫ودواﻓﻌﮫ‬ ‫اﻹﺧﺘﺮاق‬ ‫أﺳﺒﺎب‬* ‫ﺍﻟﻌﺒﺚ‬ ‫ﻟﻤﺠﺮﺩ‬ ‫ﺍﻟﻈﺎﻫﺮﺓ‬ ‫ﻫﺬﻩ‬ ‫ﺗﻨﺘﺸﺮ‬ ‫ﻟﻢ‬‫ﺍﻟﻌﺒ‬ ‫ﻛﺎﻥ‬ ‫ﻭﺇﻥ‬‫ﺃﺑﺮﺯ‬ ‫ﻣﻦ‬ ‫ﺍﻟﻔﺮﺍﻍ‬ ‫ﻭﻗﺖ‬ ‫ﻭﻗﻀﺎﺀ‬ ‫ﺚ‬‫ﺳﺎﻫﻤﺖ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﻌﻮﺍﻣﻞ‬ ‫ﺗﻄﻮﺭﻫﺎ‬ ‫ﻓﻲ‬‫ﻭﺑﺮﻭﺯﻫﺎ‬‫ﺇﻟﻲ‬‫ﻋﺎﻟﻢ‬‫ﺍﻟﻮﺟﻮﺩ‬.‫ﺃﺟﻤﻞ‬ ‫ﻭﻗﺪ‬‫ﺍﺳﺘﻌﻨﺖ‬ ‫ﺍﻟﺘﻲ‬ ‫ﻟﻠﻤﺮﺍﺟﻊ‬ ‫ﺍﻟﺜﻼﺛﺔ‬ ‫ﺍﻟﻤﺆﻟﻔﻴﻦ‬‫ﻓﻲ‬ ‫ﺑﻬﺎ‬‫ﻫﺬﻩ‬ ‫ﺍﻟﺪﻭﺭﺓ‬‫ﺍﻟﺮﺋﻴﺴﻴﺔ‬ ‫ﺍﻟﺪﻭﺍﻓﻊ‬‫ﻟﻼﺧﺘﺮﺍﻕ‬‫ﻧﻘﺎﻁ‬ ‫ﺛﻼﺙ‬ ‫ﻓﻲ‬‫ﺃﻭﺟﺰﻫﺎ‬‫ﻋﻠﻰ‬ ‫ﻫﻨﺎ‬‫ﺍﻟﺘﺎﻟﻲ‬ ‫ﺍﻟﻨﺤﻮ‬: ١-‫واﻟﻌﺴﻜﺮي‬ ‫اﻟﺴﯿﺎﺳﻲ‬ ‫اﻟﺪاﻓﻊ‬:‫ﻻﺷ‬ ‫ﻣﻤﺎ‬‫ﻚ‬‫ﻓﯿ‬‫اﻟﻌﻠﻤﻲ‬ ‫اﻟﺘﻄﻮر‬ ‫أن‬ ‫ﮫ‬‫أدﯾﺎ‬ ‫واﻟﺘﻘﻨﻲ‬‫إﻟﻲ‬‫اﻻﻋﺘﻤﺎد‬‫ﻋﻠﻰ‬ ‫ﻛﺎﻣﻞ‬ ‫ﺷﺒﺔ‬ ‫ﺑﺸﻜﻞ‬ ‫أﻏﻠﺐ‬ ‫ﻓﻲ‬ ‫اﻟﻜﻤﺒﯿﻮﺗﺮ‬ ‫أﻧﻈﻤﺔ‬‫اﻻﺣﺘﯿﺎﺟﺎت‬‫واﻟﻤﻌﻠﻮﻣﺎﺗﯿﺔ‬ ‫اﻟﺘﻘﻨﯿﺔ‬.‫اﻟﺤﺮب‬ ‫ﻓﻤﻨﺬ‬‫اﻟﺒﺎردة‬‫اﻟﻤﻌﻠﻮﻣﺎﺗﻲ‬ ‫واﻟﺼﺮاع‬‫ﺑﯿﻦ‬ ‫واﻟﺘﺠﺴﺴﻲ‬ ‫أﺷﺪه‬ ‫ﻋﻠﻰ‬ ‫اﻟﻌﻈﻤﯿﯿﻦ‬ ‫اﻟﺪوﻟﺘﯿﻦ‬.‫ﻣﻨﺎﻃﻖ‬ ‫ﺑﺮوز‬ ‫وﻣﻊ‬‫ﺟﺪﯾﺪة‬‫ﻓﻲ‬ ‫ﻟﻠﺼﺮاع‬‫وﺗﻐﯿﺮ‬ ‫اﻟﻌﺎﻟﻢ‬‫اﻟﻄﺒﯿﻌﺔ‬‫اﻟﻤﻌ‬‫ﻠﻮﻣﺎﺗﯿﺔ‬، ‫واﻟﺪول‬ ‫ﻟﻸﻧﻈﻤﺔ‬ ‫أﺻﺒﺢ‬‫اﻻﻋﺘﻤﺎد‬‫ﻋﻠﻰ‬ ‫ﻛﻠﯿﺎ‬‫اﻟﺤﺎﺳﺐ‬‫اﻵﻟﻲ‬‫ﻃﺮﯾﻘﺔ‬ ‫وﻋﻦ‬‫أﺻﺒﺢ‬‫ﺳﯿﺎﺳﯿﺔ‬ ‫ﻣﻌﻠﻮﻣﺎت‬ ‫ﻋﻠﻰ‬ ‫اﻟﺤﺼﻮل‬ ‫اﺟﻞ‬ ‫ﻣﻦ‬ ‫اﻻﺧﺘﺮاق‬‫وﻋﺴﻜﺮﯾﺔ‬ ‫أھﻤﯿﺔ‬ ‫أﻛﺜﺮ‬ ‫ﻣﺴﺎﻟﺔ‬ ‫واﻗﺘﺼﺎدﯾﺔ‬. ٢-‫اﻟﺘﺠﺎري‬ ‫اﻟﺪاﻓﻊ‬:‫ﻣﻦ‬‫ھﻲ‬ ‫ﺗﻌﯿﺶ‬ ‫اﻟﻜﺒﺮى‬ ‫اﻟﺘﺠﺎرﯾﺔ‬ ‫اﻟﺸﺮﻛﺎت‬ ‫أن‬ ‫اﻟﻤﻌﺮوف‬‫أﯾﻀﺎ‬‫ﻣﺴﺘﻌﺮة‬ ‫ﺣﺮﺑﺎ‬ ‫ﺑﯿﻨﮭﺎ‬ ‫ﻓﯿﻤﺎ‬)‫اﻟﻜﻮ‬‫ﻛﻮﻻ‬ ‫ﻛﺎ‬ ‫اﻟﻤﺜﺎل‬ ‫ﺳﺒﯿﻞ‬ ‫ﻋﻠﻰ‬ ‫ﻛﻮﻻ‬ ‫واﻟﺒﯿﺒﺴﻲ‬(‫وﻗﺪ‬‫أن‬ ‫اﻟﺤﺪﯾﺜﺔ‬ ‫اﻟﺪراﺳﺎت‬ ‫ﺑﯿﻨﺖ‬‫أﻛﺜﺮ‬ ‫ﻋﻠﯿﮭﺎ‬ ‫ﯾﺠﺮى‬ ‫اﻟﺘﺠﺎرﯾﺔ‬ ‫اﻟﺸﺮﻛﺎت‬ ‫ﻛﺒﺮﯾﺎت‬ ‫ﻣﻦ‬ ‫ﻋﺪدا‬ ‫إﺧﺘﺮاق‬ ‫ﻣﺤﺎوﻟﺔ‬ ‫ﺧﻤﺴﯿﻦ‬ ‫ﻣﻦ‬‫ﯾﻮم‬ ‫ﻛﻞ‬ ‫ﻟﺸﺒﻜﺎﺗﮭﺎ‬. ٣-‫اﻟﻔﺮدي‬ ‫اﻟﺪاﻓﻊ‬:‫ﺑﺪاءت‬‫أوﻟﻰ‬‫ﻣﺤﺎوﻻت‬‫اﻹﺧﺘﺮاق‬‫اﻟﻔﺮدﯾﺔ‬‫اﻟﺠﺎﻣﻌﺎت‬ ‫ﻃﻼب‬ ‫ﺑﯿﻦ‬‫ﻣﻦ‬ ‫ﻛﻨﻮع‬ ‫اﻟﻤﺘﺤﺪة‬ ‫ﺑﺎﻟﻮﻻﯾﺎت‬‫اﻟﺘﺒﺎھﻲ‬ ‫إﺧﺘﺮاق‬ ‫ﻓﻲ‬ ‫ﺑﺎﻟﻨﺠﺎح‬‫أﺟﮭﺰة‬‫ﺷﺨﺼﯿﺔ‬‫وﻣﻌﺎرﻓﮭﻢ‬ ‫ﻷﺻﺪﻗﺎﺋﮭﻢ‬‫ﻟﺒﺜ‬ ‫وﻣﺎ‬‫ﺖ‬‫اﻟﻈﺎھﺮة‬ ‫ﺗﻠﻚ‬ ‫ﺗﺤﻮﻟﺖ‬ ‫أن‬‫إﻟﻲ‬‫ﺗﺤﺪي‬‫ﻓﻲ‬ ‫ﺑﯿﻨﮭﻢ‬ ‫ﻓﯿﻤﺎ‬ ‫ﺑﻤﻮاﻗﻊ‬ ‫ﺛﻢ‬ ‫ﺑﺎﻟﺸﺮﻛﺎت‬ ‫اﻷﻧﻈﻤﺔ‬ ‫اﺧﺘﺮاق‬‫اﻹﻧﺘﺮﻧﺖ‬.‫ﯾﻘﺘﺼ‬ ‫وﻻ‬‫ﺮ‬‫ﻓﻘﻂ‬ ‫اﻷﻓﺮاد‬ ‫ﻋﻠﻰ‬ ‫اﻟﺪاﻓﻊ‬‫وﻧﻘﺎﺑﺎت‬ ‫ﻣﺠﻤﻮﻋﺎت‬ ‫ﺗﻮﺟﺪ‬ ‫ﺑﻞ‬‫اﺷﺒ‬‫ﮫ‬ ‫ﻣﺎﺗﻜﻮن‬‫ﺑﺎﻷﻧﺪﯾﺔ‬‫ﺗﺠﺎرﯾﺔ‬ ‫أھﺪاف‬ ‫ﺑﺬات‬ ‫وﻟﯿﺴﺖ‬.‫ﻣﻤﻦ‬ ‫اﻟﻤﺘﺤﺪة‬ ‫ﺑﺎﻟﻮﻻﯾﺎت‬ ‫ﻛﺒﺮى‬ ‫ﺑﺸﺮﻛﺎت‬ ‫اﻷﻓﺮاد‬ ‫ﺑﻌﺾ‬‫ﻣﺒﺮﻣﺠﯿﻦ‬ ‫ﯾﻌﻤﻠﻮن‬ ‫ﻛﺎﻧﻮا‬ ‫ﻣﻦ‬ ‫ﺗﺴﺮﯾﺤﮭﻢ‬ ‫ﺗﻢ‬ ‫ﻧﻈﻢ‬ ‫وﻣﺤﻠﻠﻲ‬‫أﻋﻤﺎﻟﮭﻢ‬‫اﻟﺰاﺋﺪ‬ ‫ﻟﻠﻔﺎﺋﺾ‬‫ﻏﻀﺒﮭﻢ‬ ‫ﺟﻢ‬ ‫ﻓﺼﺒﻮا‬ ‫ﺑﺎﻟﻌﻤﺎﻟﺔ‬‫ﻋﻠﻰ‬‫أﻧﻈﻤﺔ‬‫اﻟﺴﺎﺑﻘﺔ‬ ‫ﺷﺮﻛﺎﺗﮭﻢ‬‫ﻣ‬‫ﻘ‬‫ﺘﺤﻤﯿﻨﮭﺎ‬ ‫ﻟﻜﻞ‬ ‫وﻣﺨﺮﺑﯿﻦ‬‫ﻣﺎﺗﻘﻊ‬‫أﯾﺪﯾﮭﻢ‬‫ﻣﻦ‬ ‫ﻋﻠﯿﺔ‬‫ﺑﻘﺼﺪ‬ ‫ﺣﺴﺎﺳﺔ‬ ‫ﻣﻌﻠﻮﻣﺎت‬‫اﻻﻧﺘﻘﺎم‬.‫ھﻨﺎك‬ ‫اﻟﻤﻘﺎﺑﻞ‬ ‫وﻓﻲ‬‫اﻟﻘﺒﺾ‬ ‫ﺗﻢ‬ ‫ﻣﺤﺘﺮﻓﯿﻦ‬ ‫ھﺎﻛﺮز‬‫ﻋﻠﯿﮫ‬ ‫ﺗﻢ‬ ‫ﻣﻌﮭﻢ‬ ‫اﻟﺘﻔﺎوض‬ ‫وﺑﻌﺪ‬ ‫اﻟﻤﺘﺤﺪة‬ ‫ﺑﺎﻟﻮﻻﯾﺎت‬‫ﺑﻮﻛﺎﻟﺔ‬ ‫ﺗﻌﯿﯿﻨﮭﻢ‬‫اﻷﻣﺮﯾﻜﯿ‬ ‫اﻟﻤﺨﺎﺑﺮات‬‫ﺔ‬‫اﻟﺴ‬‫ﻲ‬‫أي‬‫ا‬‫ى‬‫اﻟﻔﯿﺪراﻟﻲ‬ ‫اﻟﺘﺤﻘﯿﻘﺎت‬ ‫وﺑﻤﻜﺘﺐ‬ ‫ﻣﻌﻈﻢ‬ ‫وﺗﺮﻛﺰت‬ ‫أي‬ ‫ﺑﻲ‬ ‫اﻷف‬‫ﻣﻮاﻗﻌﮭﻢ‬ ‫وﺗﺤﺪﯾﺪ‬ ‫اﻟﮭﺎﻛﺮز‬ ‫ﻣﻄﺎردة‬ ‫ﻓﻲ‬ ‫ﻣﮭﻤﺎﺗﮭﻢ‬‫ﻹرﺷﺎد‬‫اﻟﺸﺮﻃﺔ‬‫إﻟﯿﮭﻢ‬.

٣ : ١-‫اﺧﺘﺮاق‬‫اﻟﻤﺰودات‬‫أو‬‫واﻟﻤﺆﺳﺴﺎت‬ ‫ﻟﻠﺸﺮﻛﺎت‬ ‫اﻟﺮﺋﯿﺴﯿﺔ‬ ‫اﻷﺟﮭﺰة‬‫أو‬‫اﻟﺠﮭﺎت‬ ‫اﻟﺤﻜﻮﻣﯿﺔ‬ ‫وذﻟﻚ‬‫ﺑﺎﺧﺘﺮاق‬‫ﻣﺎﯾﺘﻢ‬ ‫وﻏﺎﻟﺒﺎ‬ ‫ﻟﺤﻤﺎﯾﺘﮭﺎ‬ ‫ﺗﻮﺿﻊ‬ ‫ﻋﺎدة‬ ‫اﻟﺘﻲ‬ ‫اﻟﻨﺎرﯾﺔ‬ ‫اﻟﺠﺪران‬‫ذﻟﻚ‬‫اﻟﻤﺤﺎﻛﺎة‬ ‫ﺑﺎﺳﺘﺨﺪام‬Spoofing‫ﻣﺼﻄﻠﺢ‬ ‫وھﻮ‬ ‫ﻋﻤﻠﯿﺔ‬ ‫ﻋﻠﻰ‬ ‫ﯾﻄﻠﻖ‬‫اﻧﺘﺤﺎل‬‫ﻟﻠ‬ ‫ﺷﺨﺼﯿﺔ‬‫ﺪﺧﻮل‬‫إﻟﻲ‬‫اﻟـ‬ ‫ﺣﺰم‬ ‫أن‬ ‫ﺣﯿﺚ‬ ‫اﻟﻨﻈﺎم‬IP‫ﻟﻠﻤﺮﺳﻞ‬ ‫ﻋﻨﺎوﯾﻦ‬ ‫ﻋﻠﻰ‬ ‫ﺗﺤﺘﻮي‬‫واﻟﻤﺮﺳﻞ‬‫إﻟﯿﮫ‬‫وھﺬه‬ ‫ﯾﻨﻈﺮ‬ ‫اﻟﻌﻨﺎوﯾﻦ‬‫إﻟﯿﮭﺎ‬‫وﺳﺎرﯾﺔ‬ ‫ﻣﻘﺒﻮﻟﺔ‬ ‫ﻋﻨﺎوﯾﻦ‬ ‫أﻧﮭﺎ‬ ‫ﻋﻠﻰ‬‫اﻟﺒﺮاﻣﺞ‬ ‫ﻗﺒﻞ‬ ‫ﻣﻦ‬ ‫اﻟﻤﻔﻌﻮل‬‫وأﺟﮭﺰة‬‫اﻟﺸﺒﻜﺔ‬.‫ﺗﻌﺮف‬ ‫ﻃﺮﯾﻘﺔ‬ ‫ﺧﻼل‬ ‫وﻣﻦ‬ ‫ﺑﻤﺴﺎرات‬‫اﻟﻤﺼﺪر‬Source Routing‫ﻓﺈن‬‫اﻟـ‬ ‫ﺣﺰم‬IP‫ﺗﻢ‬ ‫ﻗﺪ‬‫إﻋﻄﺎﺋﮭﺎ‬‫ﻣﻌﮫ‬ ‫ﺗﺒﺪو‬ ‫ﺷﻜﻼ‬‫وﻛﺄﻧﮭﺎ‬‫ﻣﻌﯿﻦ‬ ‫ﻛﻤﺒﯿﻮﺗﺮ‬ ‫ﻣﻦ‬ ‫ﻗﺎدﻣﺔ‬ ‫ذﻟﻚ‬ ‫وﻋﻠﻰ‬ ‫ﻣﻨﮫ‬ ‫ﻗﺎدﻣﺔ‬ ‫ﻟﯿﺴﺖ‬ ‫اﻷﻣﺮ‬ ‫ﺣﻘﯿﻘﺔ‬ ‫ﻓﻲ‬ ‫ھﻲ‬ ‫ﺑﯿﻨﻤﺎ‬‫ﺑﮭﻮﯾﺔ‬ ‫وﺛﻖ‬ ‫إذا‬ ‫اﻟﻨﻈﺎم‬ ‫ﻓﺈن‬‫ﻗﺪ‬ ‫ﺑﺬﻟﻚ‬ ‫ﯾﻜﻮن‬ ‫ﻓﺈﻧﮫ‬ ‫اﻟﺤﺰﻣﺔ‬ ‫ﻣﺼﺪر‬ ‫ﻋﻨﻮان‬ ‫ﺣﻮﻛﻲ‬)‫ﺧﺪع‬(‫وھﺬه‬‫ذاﺗﮭﺎ‬ ‫ھﻲ‬ ‫اﻟﻄﺮﯾﻘﺔ‬‫اﻟﻮﻟﻮج‬ ‫ﻓﻲ‬ ‫ﻣﯿﻞ‬ ‫اﻟﮭﻮت‬ ‫ﻣﺨﺘﺮﻗﻲ‬ ‫ﺑﮭﺎ‬ ‫ﻧﺠﺢ‬ ‫اﻟﺘﻲ‬‫إﻟﻲ‬‫ﺷﮭﺮﯾﻦ‬ ‫ﻗﺒﻞ‬ ‫اﻟﻨﻈﺎم‬ ‫ﻣﻌﻠﻮﻣﺎت‬. ٢-‫اﺧﺘﺮاق‬‫ﺑﻤﺎ‬ ‫واﻟﻌﺒﺚ‬ ‫اﻟﺸﺨﺼﯿﺔ‬ ‫اﻷﺟﮭﺰة‬‫ﺗﺤﻮﯾﮫ‬‫ﻣﻌﻠﻮﻣﺎت‬ ‫ﻣﻦ‬ ‫ﻟﻸﺳﻒ‬ ‫ﻃﺮﯾﻘﺔ‬ ‫وھﻲ‬‫ﻟﺴﺬاﺟﺔ‬ ‫ﺷﺎﺋﻌﺔ‬‫أﺻﺤﺎب‬‫ﺑﺮاﻣﺞ‬ ‫ﺗﻌﻠﻢ‬ ‫وﻟﺴﮭﻮﻟﺔ‬ ‫ﺟﺎﻧﺐ‬ ‫ﻣﻦ‬ ‫اﻟﺸﺨﺼﯿﺔ‬ ‫اﻷﺟﮭﺰة‬‫اﻻﺧﺘﺮاﻗﺎت‬‫ﻣﻦ‬ ‫وﺗﻌﺪدھﺎ‬ ‫ﺟﺎﻧﺐ‬‫أﺧﺮ‬. ٣-‫ﻟﻠﺒﯿﺎﻧﺎت‬ ‫اﻟﺘﻌﺮض‬‫أﺛﻨﺎء‬‫ﻋﻠﻰ‬ ‫واﻟﺘﻌﺮف‬ ‫اﻧﺘﻘﺎﻟﮭﺎ‬‫ﺷﻔﺮﺗﮭﺎ‬‫ﻣﺸﻔﺮة‬ ‫ﻛﺎﻧﺖ‬ ‫إن‬ ‫وھﺬه‬‫ﻛﺸﻒ‬ ‫ﻓﻲ‬ ‫ﺗﺴﺘﺨﺪم‬ ‫اﻟﻄﺮﯾﻘﺔ‬‫أرﻗ‬‫ﺎم‬‫ﺑﻄﺎﻗﺎت‬‫اﻻﺋﺘﻤﺎن‬‫اﻟﺴﺮﯾﺔ‬ ‫اﻷرﻗﺎم‬ ‫وﻛﺸﻒ‬‫ﻟﻠﺒﻄﺎﻗﺎت‬‫اﻟﺒﻨﻜﯿﺔ‬ATM‫ھﺬا‬ ‫وﻓﻲ‬‫اﻟﺴﯿﺎق‬ ‫ﻣﻦ‬ ‫ھﻨﺎ‬ ‫ﻧﺤﺬر‬‫أﻣﺮﯾﻦ‬‫ﻻﯾﺘﻢ‬‫اﻻھﺘﻤﺎم‬‫ﯾﮭﻤﺎ‬‫ﻛﺸﻒ‬ ‫ﻋﺪم‬ ‫وھﻤﺎ‬ ‫ﺟﺪي‬ ‫ﺑﺸﻜﻞ‬‫أرﻗﺎم‬‫ﺑﻄﺎﻗﺎت‬‫اﻻﺋﺘﻤﺎن‬‫اﻟﺘﺠﺎرة‬ ‫ﻟﻤﻮاﻗﻊ‬‫اﻹﻟﻜﺘﺮوﻧﯿﺔ‬‫إﻻ‬ ‫اﻟﺘﺄﻛﺪ‬ ‫ﺑﻌﺪ‬‫ﺑﺎﻟﺘﺰام‬‫ﺗﻠﻚ‬‫ﺑﻤ‬ ‫اﻟﻤﻮاﻗﻊ‬‫ﺒﺪأ‬‫اﻷﻣﺎن‬.‫ﻓﺒﻘﺪر‬ ‫اﻟﺜﺎﻧﻲ‬ ‫اﻷﻣﺮ‬ ‫أﻣﺎ‬‫ذو‬ ‫ﻣﺎھﻮ‬‫ﻋﺎﻟﯿﺔ‬ ‫أﻣﻨﯿﺔ‬ ‫أھﻤﯿﺔ‬‫ﻣﺄﺧﺬ‬ ‫ﻻﯾﺆﺧﺬ‬ ‫أﻧﮫ‬ ‫إﻻ‬‫اﻟﺠﺪﯾﺔ‬. ‫ﺑﻄﺎﻗﺔ‬ ‫ﯾﺴﺘﺨﺪم‬ ‫ﻋﻨﺪﻣﺎ‬ ‫ﻓﺎﻟﺒﻌﺾ‬‫اﻟﺴﺤﺐ‬‫اﻵﻟﻲ‬‫ﻣﻦ‬‫اﻟﻨﻘﺪﯾﺔ‬ ‫اﻟﺒﻨﻮك‬ ‫ﻣﻜﺎﺋﻦ‬ATM‫اﻟﻤﺮﻓﻖ‬ ‫اﻟﺼﻐﯿﺮ‬ ‫اﻟﺴﻨﺪ‬ ‫ﺧﺮوج‬ ‫ﻻﯾﻨﺘﻈﺮ‬‫ﺑﻌﻤﻠﯿﺔ‬ ‫اﻟﺴﺤﺐ‬‫أو‬‫دون‬ ‫ﻟﻠﻤﮭﻤﻼت‬ ‫ﺳﻠﺔ‬ ‫اﻗﺮب‬ ‫ﻓﻲ‬ ‫ﺑﮫ‬ ‫ﯾﻠﻘﻲ‬ ‫اﻧﮫ‬‫أن‬‫ﻋﻨﺎء‬ ‫ﻧﻔﺴﮫ‬ ‫ﯾﻜﻠﻒ‬‫ﺗﻤﺰﯾﻘﮫ‬‫ﺟﯿﺪا‬.‫ﻧﻈﺮﻧﺎ‬ ‫وﻟﻮ‬‫إﻟﻲ‬‫ذﻟﻚ‬‫ﺳﻨﺠﺪ‬ ‫اﻟﻤﺴﺘﻨﺪ‬ ‫أرﻗﺎﻣﺎ‬‫ﺧﺎﻧﺎت‬ ‫ﻋﺪة‬ ‫ﻣﻦ‬ ‫ﺗﺘﻜﻮن‬‫ﻃﻮﯾﻠﺔ‬‫ھﻲ‬‫اﻷرﻗﺎم‬ ‫ﺗﻠﻚ‬ ‫ﺑﺄن‬ ‫أدرﻛﻨﺎ‬ ‫ﻟﻮ‬ ‫وﻟﻜﻨﻨﺎ‬ ‫أھﻤﯿﺔ‬ ‫ﺑﺬات‬ ‫ﻟﯿﺴﺖ‬ ‫ﻟﻨﺎ‬ ‫ﺑﺎﻟﻨﺴﺒﺔ‬‫ﻓﻲ‬ ‫ﻣﺎھﻲ‬‫ﺣﻘﯿﻘﺔ‬ ‫اﻷﻣﺮ‬‫إﻻ‬‫اﻧﻌﻜﺎس‬‫ﻟﺒﻄﺎﻗﺔ‬ ‫اﻟﺨﻠﻔﯿﺔ‬ ‫ﺑﺎﻟﺠﮭﺔ‬ ‫اﻟﻈﺎھﺮ‬ ‫اﻟﻤﻤﻐﻨﻂ‬ ‫ﻟﻠﺸﺮﯾﻂ‬‫اﻟـ‬ATM‫وﺑﯿﻦ‬ ‫ﺑﯿﻨﻨﺎ‬ ‫اﻟﻮﺻﻞ‬ ‫ﺣﻠﻘﺔ‬ ‫ھﻮ‬ ‫اﻟﺸﺮﯾﻂ‬ ‫وھﺬا‬ ‫ﻣﻦ‬ ‫اﻟﺬي‬ ‫ﺑﺎﻟﺒﻨﻚ‬ ‫رﺻﯿﺪﻧﺎ‬‫ﺧﻼﻟ‬‫ﮫ‬‫ﺗﺘﻢ‬‫ﻷدرﻛﻨﺎ‬ ‫اﻟﻨﻘﺪي‬ ‫اﻟﺴﺤﺐ‬ ‫ﻋﻤﻠﯿﺔ‬‫أھﻤﯿﺔ‬‫ﺑﻄﺮﯾﻘﺔ‬ ‫اﻟﺼﻐﯿﺮ‬ ‫اﻟﻤﺴﺘﻨﺪ‬ ‫ﻣﻦ‬ ‫اﻟﺘﺨﻠﺺ‬‫ﻣﻀﻤﻮﻧﮫ‬ ‫ﺗﺮﻛﮭﺎ‬ ‫ﻋﺪم‬ ‫ھﻨﺎ‬ ‫ﺑﺎﻟﻀﻤﺎن‬ ‫وﻧﻘﺼﺪ‬‫اﻟﮭﺎﻛ‬‫ﺮ‬‫رﻗﻢ‬ ‫اﺳﺘﺨﺮاج‬ ‫ﯾﻤﻜﻨﮫ‬ ‫ﻣﺤﺘﺮف‬‫اﻟﺒﻨﻜﻲ‬ ‫اﻟﺤﺴﺎب‬‫اﻟﺴﺮﯾﺔ‬ ‫اﻷرﻗﺎم‬ ‫ﻋﻠﻰ‬ ‫واﻟﺘﻌﺮف‬ ‫ﺑﻞ‬ ‫اﻟﺒﻨﻜﯿﺔ‬ ‫ﻟﻠﺒﻄﺎﻗﺔ‬ATM .

٤ ‫ﺗﻌـﺮﯾﻒ‬‫اﻟﮭﺎﻛﺮ‬ ‫اﻟ‬ ‫ﻣﻊ‬ ‫اﻟﺘﻌﺎﻣﻞ‬ ‫ﻓﻲ‬ ‫ﻣﺎھﺮ‬ ‫ﺷﺨﺺ‬ ‫ھﻮ‬‫ﺸﺒﻜﺎت‬ ‫اﻹﻧﺘﺮﻧﺖ‬ ‫ﺷﺒﻜﺔ‬ ‫ﺧﺼﻮﺻﺎ‬،‫اﺧﺘﺮاق‬ ‫ﻓﻲ‬ ‫ﺧﺒﯿﺮ‬ ‫وھﻮ‬‫أﺟﮭﺰة‬‫اﻟﻜﻤﺒﯿﻮﺗﺮ‬ ‫ﻏﯿﺮ‬ ‫ﺑﺸﻜﻞ‬ ‫اﻟﺤﻤﺎﯾﺔ‬ ‫وﺑﺮاﻣﺞ‬ ‫اﻟﻔﻀﻮل‬ ‫ﺑﺪاﻓﻊ‬ ‫ﻗﺎﻧﻮﻧﻲ‬،‫ﻣﺆذي‬ ‫ﻏﯿﺮ‬ ‫وھﻮ‬‫إﻃﻼﻗﺎ‬ ‫اﻟﻜﺮاﻛﺮ‬ ‫ﺗﻌﺮﯾﻒ‬ ‫اھﺘﻤﺎﻣﺎﺗﮫ‬ ‫ﺗﻨﺤﺼﺮ‬ ‫ﻟﻜﻦ‬ ‫اﻟﮭﺎﻛﺮ‬ ‫ﻣﺜﻞ‬ ‫ھﻮ‬ ‫اﻹﻧﺘﺮﻧﺖ‬ ‫وﻣﻮاﻗﻊ‬ ‫اﻟﺒﺮاﻣﺞ‬ ‫ﺑﺴﺮﻗﺔ‬،‫ﺑﻮﺿﻊ‬ ‫ﯾﻘﻮم‬ ‫إذ‬ ‫ﻣﺪﻣﺮ‬ ‫وھﻮ‬ ‫واﻟﺘﺮوﺟﻮﻧﺎت‬ ‫اﻟﻔﯿﺮوﺳﺎت‬)‫أﺣﺼﻨ‬‫ﻃﺮواد‬ ‫ﺔ‬‫ة‬(‫ﯾﻘﻮم‬ ‫اﻟﺘﻲ‬ ‫واﻷﺟﮭﺰة‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫ﻓﻲ‬‫ﺑﺎﺧﺘﺮاﻗﮭﺎ‬ ‫اﻟﻨﻮﻛﺮ‬ ‫ﺗﻌﺮﯾﻒ‬ ‫ﻛﻞ‬ ‫ﺷﺨﺺ‬ ‫ھﻮ‬‫اھﺘﻤﺎﻣﺎﺗﮫ‬‫اﻷﺟﮭﺰة‬ ‫ﺗﺪﻣﯿﺮ‬ ‫ھﻲ‬ , ‫اﻟﻔﺮﻋﯿﺔ‬ ‫ﻟﻠﺬاﻛﺮة‬ ‫ﺗﺪﻣﯿﺮي‬ ‫ﺑﻌﻤﻞ‬ ‫ﯾﻘﻮم‬ ‫وھﻮ‬)‫اﻟﻤﯿﻤﻮري‬(‫وﯾﻘﻮم‬ ‫اﻟﺘﻲ‬ ‫ﻟﻸﺟﮭﺰة‬ ‫ﻓﻮرﻣﺎت‬ ‫ﺑﻌﻤﻞ‬ ‫ﻣﻠﻔﺎت‬ ‫ﯾﺮﺳﻞ‬ ‫أو‬ ‫ﯾﺨﺘﺮﻗﮭﺎ‬‫اﻟﻜﻤﺒﯿﻮﺗ‬ ‫ﻟﺘﺪﻣﯿﺮ‬‫ﺮ‬ . ‫ﺗﻌﺮﯾﻒ‬‫اﻟﺴﻠﯿﯿﺮ‬ ‫ﺧﻄﻮا‬ ‫ﯾﺘﺘﺒﻊ‬ ‫ﻣﻦ‬ ‫وھﻮ‬‫واﻟﻨﻮﻛﺮ‬ ‫اﻟﻜﺮاﻛﺮ‬ ‫ت‬ ‫ﻣﺜﻞ‬ ‫اﻟﻤﺨﺘﺼﺔ‬ ‫ﻟﻠﺠﮭﺎت‬ ‫ﺑﺈرﺳﺎﻟﮭﺎ‬ ‫ﻟﯿﻘﻮم‬ ‫ﻋﻨﮭﻢ‬ ‫اﻟﻤﻌﻠﻮﻣﺎت‬ ‫ﻛﻞ‬ ‫وﯾﺠﻤﻊ‬ ‫ﻟﯿﻘﻮﻣﻮا‬ ‫اﻹﻧﺘﺮﻧﺖ‬ ‫ﺷﺮﻃﺔ‬ ‫ﻣﺎ‬ ‫ﻏﺎﻟﺒﺎ‬ ‫وھﻢ‬ ‫ﻋﻠﯿﮭﻢ‬ ‫ﺑﺎﻟﻘﺒﺾ‬‫ﯾﻜﻮﻧﻮ‬‫ا‬‫اﻹﻧﺘﺮﻧﺖ‬ ‫ﺷﺮﻃﺔ‬ ‫ﻓﻲ‬ ‫ﻣﻮﻇﻔﯿﻦ‬ ‫اﻟﻌﺎﻟﻤﯿﺔ‬

٥ ‫؟‬ ‫ﺟﮭﺎزك‬ ‫اﺧﺘﺮاق‬ ‫ﻋﻠﻰ‬ ‫ﺗﺴﺎﻋﺪھﻢ‬ ‫اﻟﺘﻲ‬ ‫اﻷﺷﯿﺎء‬ ‫ھﻲ‬ ‫ﻣﺎ‬ ١-‫ﺗﺮوﺟﺎن‬ ‫أو‬ ‫ﺑﺎﺗﺶ‬ ‫ﻣﻠﻒ‬ ‫وﺟﻮد‬ (patch)(Trojan)  ( !! ٢-‫اﻹﻧﺘﺮﻧﺖ‬ ‫ﺑﺸﺒﻜﺔ‬ ‫اﻻﺗﺼﺎل‬  !!   ٣-‫اﻟﺘﺠﺴﺲ‬ ‫ﺑﺮﻧﺎﻣﺞ‬ ! : Web Cracker 4 Net Buster Net Bus Haxporg Net Bus 1.7 Girl Friend BusScong BO Client and Server Hackers Utility

٦ ‫ﺍﳍ‬‫ﻳﺘﻤﻜﻦ‬‫ﻛﻴﻒ‬‫ﻣﻦ‬‫ﺎﻛﺮ‬‫؟‬‫ﺟﻬﺎﺯﻙ‬‫ﺇﱃ‬‫ﺍﻟﺪﺧﻮﻝ‬ ‫ﲟﻠﻒ‬ ‫ﻟﻺﺻﺎﺑﺔ‬ ‫ﺍﻟﻜﻤﺒﻴﻮﺗﺮ‬ ‫ﺟﻬﺎﺯ‬ ‫ﻳﺘﻌﺮﺽ‬ ‫ﻋﻨﺪﻣﺎ‬‫ﻭﻫﻮ‬ ‫ﺍﻟﺘﺠﺴﺲ‬)‫ﺍﻟﺘﺮﻭﺟﺎﻥ‬ ‫ﺃﻭ‬ ‫ﺍﻟﺒﺎﺗﺶ‬(‫ﺑﻮﺭﺕ‬ ‫ﺑﻔﺘﺢ‬ ‫ﻳﻘﻮﻡ‬ ‫ﺍﻟﻔﻮﺭ‬ ‫ﻋﻠﻰ‬ ‫ﻓﺈﻧﻪ‬ )port(‫ﻣﻨﻔﺬ‬ ‫ﺃﻭ‬‫ﺍﻟﺬﻱ‬ ‫ﺍﳌﻠﻒ‬ ‫ﻫﺬﺍ‬ ‫ﺧﻼﻝ‬ ‫ﻣﻦ‬ ‫ﺟﻬﺎﺯﻙ‬ ‫ﻳﻘﺘﺤﻢ‬ ‫ﺃﻥ‬ ‫ﲡﺴﺲ‬ ‫ﺑﺮﻧﺎﻣﺞ‬ ‫ﻟﺪﻳﻪ‬ ‫ﻣﻦ‬ ‫ﻛﻞ‬ ‫ﻓﻴﺴﺘﻄﻴﻊ‬ ‫ﺟﻬﺎﺯﻙ‬ ‫ﺩﺍﺧﻞ‬‫ﻳﻘﻮﻡ‬ ‫ﺑﺎﻟﻨﺎﻓﺬﺓ‬ ‫ﺃﺷﺒﻪ‬ ‫ﻣﻨﻄﻘﺔ‬ ‫ﺑﻔﺘﺢ‬‫ﺍﳍﺎﻛﺮﺯ‬ ‫ﻭﻫﻢ‬ ‫ﺍﻟﻠﺼﻮﺹ‬ ‫ﻣﻨﻬﺎ‬ ‫ﻳﺪﺧﻞ‬ ‫ﺍﻟﱵ‬ ‫ﺍﻟﺴﺮﻳﺔ‬!! ‫؟‬ ‫ﺑﻌﻴﻨﻪ‬ ‫ﻛﻤﺒﻴﻮﺗﺮ‬ ‫ﺟﻬﺎﺯ‬ ‫ﺇﱃ‬ ‫ﺍﻟﺪﺧﻮﻝ‬ ‫ﻣﻦ‬ ‫ﺍﳍﺎﻛﺮ‬ ‫ﻳﺘﻤﻜﻦ‬ ‫ﻛﻴﻒ‬ ‫ﺍﳍﺎﻛﺮ‬ ‫ﻳﺴﺘﻄﻴﻊ‬ ‫ﻻ‬‫ﻭﻫﻲ‬ ‫ﺃﺳﺎﺳﻴﺔ‬ ‫ﺷﺮﻭﻁ‬ ‫ﻋﺪﺓ‬ ‫ﺗﻮﺍﻓﺮﺕ‬ ‫ﺇﺫﺍ‬ ‫ﺇﻻ‬ ‫ﺑﻌﻴﻨﻪ‬ ‫ﻛﻤﺒﻴﻮﺗﺮ‬ ‫ﺟﻬﺎﺯ‬ ‫ﳜﺘﺮﻕ‬ ‫ﺃﻥ‬: ١-‫ﻛﺎﻥ‬ ‫ﺇﺫﺍ‬‫ﺍﻟﺘﺠﺴﺲ‬ ‫ﻣﻠﻒ‬ ‫ﳛﻮﻱ‬ ‫ﺍﻟﻜﻤﺒﻴﻮﺗﺮ‬ ‫ﻫﺬﺍ‬)‫ﺍﻟﺒﺎﺗﺶ‬. ( ٢-‫ﻳ‬ ‫ﺍﳍﺎﻛﺮ‬ ‫ﻛﺎﻥ‬ ‫ﺇﺫﺍ‬‫ﻌﺮﻑ‬‫ﺬﺍ‬ ‫ﺍﳋﺎﺹ‬ ‫ﺃﺩﺭﺱ‬ ‫ﰊ‬ ‫ﺍﻵﻱ‬ ‫ﺭﻗﻢ‬‫ﺍﻟﺸﺨﺺ‬... ‫ﺍﻷﺧﺮﻯ‬ ‫ﺍﻟﺸﺮﻭﻁ‬ ‫ﻭﺟﻮﺩ‬ ‫ﻣﻦ‬ ‫ﻻﺑﺪ‬ ‫ﹰ‬‫ﺎ‬‫ﻭﻃﺒﻌ‬‫ﺍﻟﺘﺠﺴﺲ‬ ‫ﺑﺮﻧﺎﻣﺞ‬ ‫ﺍﺳﺘﺨﺪﺍﻡ‬ ‫ﺑﻜﻴﻔﻴﺔ‬ ‫ﺍﳍﺎﻛﺮ‬ ‫ﻭﻣﻌﺮﻓﺔ‬ ‫ﺑﺎﻹﻧﺘﺮﻧﺖ‬ ‫ﺍﻟﻀﺤﻴﺔ‬ ‫ﺍﺗﺼﺎﻝ‬ ‫ﻭﻫﻲ‬ ‫ﻭﺍﻻﺧﺘﺮﺍﻕ‬‫ﺧﻼﻟﻪ‬ ‫ﻣﻦ‬! ‫ﻣﻠﻔﺎﺕ‬ ‫ﺃﻱ‬ ‫ﳛﻮﻱ‬ ‫ﻭﻻ‬ ‫ﹰ‬‫ﺎ‬‫ﺳﻠﻴﻤ‬ ‫ﺍﻟﻜﻤﺒﻴﻮﺗﺮ‬ ‫ﺟﻬﺎﺯ‬ ‫ﻛﺎﻥ‬ ‫ﺇﺫﺍ‬ ‫ﺁﺧﺮ‬ ‫ﲟﻌﲎ‬‫ﻋﻠﻴﻪ‬ ‫ﻳﺪﺧﻞ‬ ‫ﺃﻥ‬ ‫ﺍﳌﺴﺘﺤﻴﻞ‬ ‫ﻓﻤﻦ‬ ‫ﺑﺎﺗﺶ‬‫ﻟﻮ‬ ‫ﺣﱴ‬ ‫ﻋﺎﺩﻱ‬ ‫ﻫﺎﻛﺮ‬ ‫ﺃﻱ‬ ‫ﻣﺎ‬ ‫ﺃﺩﺭﺱ‬ ‫ﰊ‬ ‫ﺍﻵﻱ‬ ‫ﺭﻗﻢ‬ ‫ﻳﻌﺮﻑ‬ ‫ﻛﺎﻥ‬‫ﻃﺮﻗﻬﻢ‬ ‫ﻭﻟﺪﻳﻬﻢ‬ ‫ﻣﺎﻧﻊ‬ ‫ﺃﻱ‬ ‫ﻭﲢﺖ‬ ‫ﻃﺮﻳﻘﺔ‬ ‫ﺑﺄﻳﺔ‬ ‫ﺍﻟﺪﺧﻮﻝ‬ ‫ﻋﻠﻰ‬ ‫ﻗﺎﺩﺭﻭﻥ‬ ‫ﻭﻫﻢ‬ ‫ﻓﻘﻂ‬ ‫ﺍﶈﺘﺮﻓﲔ‬ ‫ﻋﺪﺍ‬ ‫ﺍﻷﻧﻈﻤﺔ‬ ‫ﳐﺘﻠﻒ‬ ‫ﺇﱃ‬ ‫ﺍﻟﻮﻟﻮﺝ‬ ‫ﰲ‬ ‫ﺍﻟﺴﺮﻳﺔ‬!! ‫ﺍﻵﻱ‬ ‫ﺭﻗﻢ‬ ‫ﻳﻌﺮﻑ‬ ‫ﻻ‬ ‫ﺍﳍﺎﻛﺮ‬ ‫ﻛﺎﻥ‬ ‫ﻭﺇﺫﺍ‬‫ﻛ‬ ‫ﻟﻮ‬ ‫ﺣﱴ‬ ‫ﺟﻬﺎﺯﻙ‬ ‫ﺇﱃ‬ ‫ﺍﻟﺪﺧﻮﻝ‬ ‫ﻳﺴﺘﻄﻴﻊ‬ ‫ﻟﻦ‬ ‫ﻓﺈﻧﻪ‬ ‫ﺑﻚ‬ ‫ﺍﳋﺎﺹ‬ ‫ﺃﺩﺭﺱ‬ ‫ﰊ‬‫ﳛﻮﻱ‬ ‫ﺟﻬﺎﺯﻙ‬ ‫ﺎﻥ‬ ‫ﻣﻠﻒ‬‫ﺍﻟﺒﺎﺗﺶ‬! ‫؟‬ ‫أدرس‬ ‫ﺑﻲ‬ ‫اﻵي‬ ‫رﻗﻢ‬ ‫ھﻮ‬ ‫ﻣﺎ‬ ‫أﻧﮫ‬ ‫أي‬ ‫اﻹﻧﺘﺮﻧﺖ‬ ‫ﻟﺸﺒﻜﺔ‬ ‫ﻣﺴﺘﺨﺪم‬ ‫ﺑﻜﻞ‬ ‫اﻟﺨﺎص‬ ‫اﻟﻌﻨﻮان‬ ‫ھﻮ‬‫اﻹﻧﺘﺮﻧﺖ‬ ‫ﺷﺒﻜﺔ‬ ‫ﺗﺼﻔﺢ‬ ‫أﺛﻨﺎء‬ ‫اﻟﻜﻤﺒﯿﻮﺗﺮ‬ ‫ﻣﻜﺎن‬ ‫ﱠﺮف‬‫ﻌ‬ُ‫ﯾ‬ ‫اﻟﺬي‬ ‫اﻟﺮﻗﻢ‬ ‫ﻣﻦ‬ ‫ﯾﺘﻜﻮن‬ ‫وھﻮ‬٤‫أرﻗﺎم‬‫واﻟﺘﺎﻟﻲ‬ ‫اﻟﺒﻠﺪ‬ ‫ﻋﻨﻮان‬ ‫إﻟﻰ‬ ‫ﯾﺸﯿﺮ‬ ‫ﻓﺄﺣﺪھﺎ‬ ‫ﻣﻌﯿﻦ‬ ‫ﻋﻨﻮان‬ ‫إﻟﻰ‬ ‫ﯾﺸﯿﺮ‬ ‫ﻣﻨﮭﺎ‬ ‫ﺟﺰء‬ ‫وﻛﻞ‬‫إﻟﻰ‬ ‫ﯾﺸﯿﺮ‬‫ﻋﻨﻮان‬ ‫اﻟﻤﺴﺘﺨﺪم‬ ‫ھﻮ‬ ‫واﻟﺮاﺑﻊ‬ ‫اﻟﻤﺴﺘﺨﺪﻣﺔ‬ ‫اﻟﻤﺆﺳﺴﺔ‬ ‫إﻟﻰ‬ ‫واﻟﺜﺎﻟﺚ‬ ‫اﻟﻤﻮزﻋﺔ‬ ‫اﻟﺸﺮﻛﺔ‬.. ‫اﻹﻧﺘﺮﻧﺖ‬ ‫إﻟﻰ‬ ‫دﺧﻮل‬ ‫ﻛﻞ‬ ‫ﻣﻊ‬ ‫ﯾﺘﻐﯿﺮ‬ ‫ﻓﮭﻮ‬ ‫ﺛﺎﺑﺖ‬ ‫وﻏﯿﺮ‬ ‫ﻣﺘﻐﯿﺮ‬ ‫ﺑﻲ‬ ‫اﻵي‬ ‫ورﻗﻢ‬..‫آﺧﺮ‬ ‫ﺑﻤﻌﻨﻰ‬‫ﺑﺎﻻﻧﺘﺮﻧﺖ‬ ‫اﺗﺼﻠﺖ‬ ‫أﻧﻚ‬ ‫ﻟﻨﻔﺮض‬ ‫رﻗﻢ‬ ‫إﻟﻰ‬ ‫وﻧﻈﺮت‬‫اﻵي‬‫ﻓﻮﺟﺪت‬ ‫ﺑﻚ‬ ‫اﻟﺨﺎص‬ ‫ﺑﻲ‬‫أﻧﮫ‬: 212.123.123.200 ‫ﻣﻦ‬ ‫ﺧﺮﺟﺖ‬ ‫ﺛﻢ‬‫ﻋﺎودت‬ ‫ﺛﻢ‬ ‫اﻻﺗﺼﺎل‬ ‫أﻗﻔﻠﺖ‬ ‫أو‬ ‫اﻻﻧﺘﺮﻧﺖ‬‫ﻟﯿﺼﺒﺢ‬ ‫ﯾﺘﻐﯿﺮ‬ ‫اﻟﺮﻗﻢ‬ ‫ﻓﺈن‬ ‫دﻗﺎﺋﻖ‬ ‫ﻋﺪة‬ ‫ﺑﻌﺪ‬ ‫اﻻﺗﺼﺎل‬‫ﻛﺎﻟﺘﺎﻟﻲ‬: 212.123.123.366 ‫اﻷرﻗﺎم‬ ‫ﻓﻲ‬ ‫اﻟﺘﻐﯿﺮ‬ ‫ﻻﺣﻆ‬‫اﻷﺧﯿﺮة‬:‫اﻟﺮﻗﻢ‬٢٠٠‫أﺻﺒﺢ‬٣٦٦. ‫ﯾﻨﺼﺢ‬ ‫وﻟﺬﻟﻚ‬‫ﻣﺜﻞ‬ ‫اﻟﻤﺤﺎدﺛﺔ‬ ‫ﺑﺮاﻣﺞ‬ ‫ﺑﻌﺮض‬ ‫اﺳﺘﺨﺪام‬ ‫ﺑﻌﺪم‬)‫اﻵﯾﺴﻜﯿﻮ‬ICQ(‫ﺑﻲ‬ ‫اﻵي‬ ‫رﻗﻢ‬ ‫ﺑﺈﻇﮭﺎر‬ ‫ﯾﻘﻮم‬ ‫ﻷﻧﮫ‬‫ﺑﺸﻜﻞ‬‫ﺣﺘﻰ‬ ‫داﺋﻢ‬ ‫اﻟﺸﺨﺺ‬ ‫ﺟﮭﺎز‬ ‫إﻟﻰ‬ ‫اﻟﺪﺧﻮل‬ ‫ﻓﻲ‬ ‫اﺳﺘﺨﺪاﻣﮫ‬ ‫ﻣﻦ‬ ‫اﻟﮭﺎﻛﺮ‬ ‫ﻓﯿﺘﻤﻜﻦ‬ ‫إﺧﻔﺎﺋﮫ‬ ‫ﻣﻊ‬‫ﻛﻤﺒﯿﻮﺗﺮ‬ ‫ﯾﺤﺘﻮي‬ ‫أن‬ ‫وھﻮ‬ ‫ﺷﺮط‬ ‫ﺗﻮاﻓﺮ‬ ‫ﻣﻊ‬ ‫اﻟﻤﻄﻠﻮب‬ ‫ﺗﺠﺴﺲ‬ ‫ﻣﻠﻒ‬ ‫أو‬ ‫ﻣﻨﻔﺬ‬ ‫ﻋﻠﻰ‬ ‫اﻟﺸﺨﺺ‬ ‫ھﺬا‬)‫ﺑﺎﺗﺶ‬(!!

٧ ‫؟‬ ‫اﻟﻔﯿﺮوﺳﺎت‬ ‫ﺣﺘﻰ‬ ‫أو‬ ‫اﻟﺘﺮوﺟﺎن‬ ‫أو‬ ‫اﻟﺒﺎﺗﺶ‬ ‫ﺑﻤﻠﻒ‬ ‫ﺟﮭﺎزك‬ ‫ﯾﺼﺎب‬ ‫ﻛﯿﻒ‬ ‫اﻷوﻟﻰ‬ ‫اﻟﻄﺮﯾﻘﺔ‬: ‫ﻣ‬ ‫اﻟﺘﺠﺴﺲ‬ ‫ﻣﻠﻒ‬ ‫ﯾﺼﻠﻚ‬ ‫أن‬‫أو‬ ‫اﻟﻤﺤﺎدﺛﺔ‬ ‫ﻋﺒﺮ‬ ‫ﺷﺨﺺ‬ ‫ﺧﻼل‬ ‫ﻦ‬)‫اﻟﺸﺎت‬)‫ﻣﻠﻒ‬ ‫أو‬ ‫ﺻﻮرة‬ ‫ﻟﻚ‬ ‫اﻟﮭﺎﻛﺮ‬ ‫أﺣﺪ‬ ‫ﯾﺮﺳﻞ‬ ‫أن‬ ‫وھﻲ‬ ‫اﻟﺘﺮوﺟﺎن‬ ‫أو‬ ‫اﻟﺒﺎﺗﺶ‬ ‫ﻋﻠﻰ‬ ‫ﯾﺤﺘﻮي‬!‫وﻻﺑﺪ‬‫ﻣﻠﻒ‬ ‫أو‬ ‫ﺻﻮرة‬ ‫ﻓﻲ‬ ‫اﻟﺒﺎﺗﺶ‬ ‫ﯾﻐﺮز‬ ‫أن‬ ‫اﻟﮭﺎﻛﺮ‬ ‫ﺑﺈﻣﻜﺎن‬ ‫أﻧﮫ‬ ‫اﻟﻌﺰﯾﺰ‬ ‫ﺻﺪﯾﻘﻲ‬ ‫ﺗﻌﻠﻢ‬ ‫أن‬ ‫ﺗﺴﺘﻄﯿﻊ‬ ‫ﻓﻼ‬‫ا‬ ‫ﺗﺸﺎھﺪ‬ ‫ﺣﯿﺚ‬ ‫اﻟﻔﯿﺮوﺳﺎت‬ ‫أو‬ ‫اﻟﺒﺎﺗﺶ‬ ‫ﻛﺸﻒ‬ ‫ﺑﺮﻧﺎﻣﺞ‬ ‫ﺑﺎﺳﺘﺨﺪام‬ ‫إﻻ‬ ‫ﻣﻌﺮﻓﺘﮫ‬‫اﻟﻤﻠﻒ‬ ‫أو‬ ‫ﻟﺼﻮرة‬‫وﻻ‬ ‫ﻃﺒﯿﻌﻲ‬ ‫ﺑﺸﻜﻞ‬ ‫ﺷﻮارع‬ ‫ﻋﻦ‬ ‫ﻋﺒﺎرة‬ ‫ﺟﮭﺎزك‬ ‫ﯾﺠﻌﻞ‬ ‫رﺑﻤﺎ‬ ‫ﻓﯿﺮوس‬ ‫أو‬ ‫ﺑﺎﺗﺶ‬ ‫ﻋﻠﻰ‬ ‫ﯾﺤﺘﻮي‬ ‫أﻧﮫ‬ ‫ﺗﻌﻠﻢ‬‫واﻟﻤﺘﻄﻔﻠﻮن‬ ‫اﻟﮭﺎﻛﺮ‬ ‫ﯾﺪﺧﻠﮭﺎ‬! ‫اﻟﺜﺎﻧﯿﺔ‬ ‫اﻟﻄﺮﯾﻘﺔ‬: ‫ﻣﻦ‬ ‫اﻟﺒﺎﺗﺶ‬ ‫ﯾﺼﻠﻚ‬ ‫أن‬‫اﻟﺸﺨﺺ‬ ‫ﻣﺎھﯿﺔ‬ ‫ﺗﻌﻠﻢ‬ ‫وﻻ‬ ‫اﻟﺮﺳﺎﻟﺔ‬ ‫ﻣﺼﺪر‬ ‫ﺗﻌﻠﻢ‬ ‫ﻻ‬ ‫اﻹﻟﻜﺘﺮوﻧﻲ‬ ‫اﻟﺒﺮﯾﺪ‬ ‫ﻋﺒﺮ‬ ‫رﺳﺎﻟﺔ‬ ‫ﺧﻼل‬‫ﻓﺘﻘﻮم‬ ‫اﻟﻤﺮﺳﻞ‬ ‫ﺑﺘﻨﺰﯾﻞ‬‫ﺳﯿﺠﻌﻞ‬ ‫أﻧﮫ‬ ‫ﺗﻌﻠﻢ‬ ‫ﻻ‬ ‫وأﻧﺖ‬ ‫ﻓﺘﺤﮫ‬ ‫ﺛﻢ‬ ‫وﻣﻦ‬ ‫اﻟﺮﺳﺎﻟﺔ‬ ‫ﻣﻊ‬ ‫اﻟﻤﺮﻓﻖ‬ ‫اﻟﻤﻠﻒ‬‫ﻋﻠﯿﻚ‬ ‫وﯾﺘﻄﻔﻠﻮن‬ ‫ﺟﮭﺎزك‬ ‫إﻟﻰ‬ ‫ﯾﺪﺧﻠﻮن‬ ‫اﻟﺠﻤﯿﻊ‬.. ‫اﻟﺜﺎﻟﺜﺔ‬ ‫اﻟﻄﺮﯾﻘﺔ‬: ‫إﻧﺰال‬‫ﻋﻠﻰ‬ ‫ﺗﺴﺎﻋﺪ‬ ‫اﻟﺘﻲ‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫أو‬ ‫اﻟﺠﻨﺴﯿﺔ‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫ﻣﺜﻞ‬ ‫ﻣﺸﺒﻮھﺔ‬ ‫ﻣﻮاﻗﻊ‬ ‫ﻣﻦ‬ ‫ﻣﻠﻔﺎت‬ ‫أو‬ ‫ﺑﺮاﻣﺞ‬‫اﻟﺘﺠﺴﺲ‬ ‫ﺗﻌﻠﯿﻢ‬! ‫اﻟﺮاﺑﻌﺔ‬ ‫اﻟﻄﺮﯾﻘﺔ‬: ‫ﻣﻮا‬ ‫إﻟﻰ‬ ‫اﻟﺪﺧﻮل‬‫ﻣﺜﻞ‬ ‫ﻣﺸﺒﻮھﺔ‬ ‫ﻗﻊ‬‫ﺟﮭﺎزك‬ ‫ﻓﻲ‬ ‫اﻟﻤﻠﻒ‬ ‫ﺗﻨﺰﯾﻞ‬ ‫ﯾﺘﻢ‬ ‫ﻓﺈﻧﮫ‬ ‫اﻟﻤﻮﻗﻊ‬ ‫إﻟﻰ‬ ‫دﺧﻮﻟﻚ‬ ‫ﺑﻤﺠﺮد‬ ‫أﻧﮫ‬ ‫ﺣﯿﺚ‬ ‫اﻟﺠﻨﺴﯿﺔ‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫ﻋﻨﮭﺎ‬ ‫ﺗﺪري‬ ‫ﻻ‬ ‫ﻛﻮﻛﯿﺰ‬ ‫ﺑﻮاﺳﻄﺔ‬!! ‫اﻟﺼﻔﺤﺎت‬ ‫ﺑﺘﻔﺨﯿﺦ‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫ھﺬه‬ ‫ﻣﺜﻞ‬ ‫أﺻﺤﺎب‬ ‫ﯾﻘﻮم‬ ‫ﺣﯿﺚ‬‫ﺗﻘﻮم‬ ‫اﻟﺼﻔﺤﺎت‬ ‫ھﺬه‬ ‫إﻟﻰ‬ ‫اﻟﺪﺧﻮل‬ ‫ﻓﻲ‬ ‫اﻟﺰوار‬ ‫أﺣﺪ‬ ‫ﯾﺮﻏﺐ‬ ‫ﻓﻌﻨﺪﻣﺎ‬ ‫أﻣﺮ‬ ‫ﺑﺈﺻﺪار‬ ‫اﻟﻤﻮﻗﻊ‬ ‫ﺻﻔﺤﺎت‬‫ﻣﻠﻒ‬ ‫ﺑﺘﻨﺰﯾﻞ‬‫ﺟﮭﺎزك‬ ‫ﻓﻲ‬ ‫اﻟﺘﺠﺴﺲ‬! ‫ﯾﻮد‬ ‫اﻟﺬي‬ ‫اﻟﺠﮭﺎز‬ ‫اﻟﮭﺎﻛﺮ‬ ‫ﯾﺨﺘﺎر‬ ‫ﻛﯿﻒ‬‫؟‬ ‫اﺧﺘﺮاﻗﮫ‬ ‫ﻻﺧﺘﺮاﻗﮫ‬ ‫ﺑﻌﯿﻨﮫ‬ ‫ﻛﻤﺒﯿﻮﺗﺮ‬ ‫اﺧﺘﯿﺎر‬ ‫ﻣﻦ‬ ‫اﻟﻌﺎدي‬ ‫اﻟﮭﺎﻛﺮ‬ ‫ﯾﺴﺘﻄﯿﻊ‬ ‫ﻻ‬ ‫ﻋﺎم‬ ‫ﺑﺸﻜﻞ‬‫ﺑﮫ‬ ‫اﻟﺨﺎص‬ ‫أدرس‬ ‫ﺑﻲ‬ ‫اﻵي‬ ‫رﻗﻢ‬ ‫ﯾﻌﺮف‬ ‫ﻛﺎن‬ ‫إذا‬ ‫إﻻ‬ ‫رﻗﻢ‬ ‫ﺑﺈدﺧﺎل‬ ‫ﯾﻘﻮم‬ ‫ﻓﺈﻧﮫ‬ ً‫ﺎ‬‫ﺳﺎﺑﻘ‬ ‫ذﻛﺮﻧﺎ‬ ‫ﻛﻤﺎ‬‫ﺑﺮﻧﺎﻣﺞ‬ ‫ﻓﻲ‬ ‫اﻟﻀﺤﯿﺔ‬ ‫ﺑﻜﻤﺒﯿﻮﺗﺮ‬ ‫اﻟﺨﺎص‬ ‫أدرس‬ ‫ﺑﻲ‬ ‫اﻵي‬‫أﻣﺮ‬ ‫إﺻﺪار‬ ‫ﺛﻢ‬ ‫وﻣﻦ‬ ‫اﻟﺘﺠﺴﺲ‬ ‫إﻟﻰ‬ ‫اﻟﺪﺧﻮل‬‫اﻟﻤﻄﻠﻮب‬ ‫اﻟﺠﮭﺎز‬!! ‫ﻣﺜﻞ‬ ‫ﺑﺮﻧﺎﻣﺞ‬ ‫ﺑﺎﺳﺘﺨﺪام‬ ‫ﯾﻘﻮﻣﻮن‬ ‫اﻟﻤﺨﺘﺮﻗﯿﻦ‬ ‫وأﻏﻠﺐ‬( IP Scan )‫أو‬‫اﻟﮭﺎﻛﺮ‬ ‫ﯾﻘﻮم‬ ‫ﺑﺮﻧﺎﻣﺞ‬ ‫وھﻮ‬ ‫ﺑﻲ‬ ‫اﻵي‬ ‫رﻗﻢ‬ ‫ﻛﺎﺷﻒ‬ ‫اﻟﺘﻲ‬ ‫ﺑﻲ‬ ‫اﻵي‬ ‫أرﻗﺎم‬ ‫ﻋﻠﻰ‬ ‫ﻟﻠﺤﺼﻮل‬ ‫ﺑﺎﺳﺘﺨﺪاﻣﮫ‬‫اﻟﺘﺠﺴﺲ‬ ‫ﻣﻠﻒ‬ ‫ﻋﻠﻰ‬ ‫ﺗﺤﺘﻮي‬ ‫اﻟﺘﻲ‬ ‫اﻟﻤﻀﺮوﺑﺔ‬ ‫ﺑﺎﻷﺟﮭﺰة‬ ‫ﺗﺘﻌﻠﻖ‬)‫اﻟﺒﺎﺗﺶ‬) ! ‫ﺗﺸﻐﯿﻞ‬ ‫ﯾﺘﻢ‬‫اﻓﺘﺮاﺿﯿﮫ‬ ‫ﺑﻲ‬ ‫آي‬ ‫أرﻗﺎم‬ ‫ﺑﻮﺿﻊ‬ ‫اﻟﻤﺨﺘﺮق‬ ‫ﯾﻘﻮم‬ ‫ﺛﻢ‬ ‫اﻟﺒﺮﻧﺎﻣﺞ‬..‫رﻗﻤﯿﻦ‬ ‫ﺑﻮﺿﻊ‬ ‫ﯾﻘﻮم‬ ‫أﻧﮫ‬ ‫أي‬‫ﻣﻦ‬ ‫ﻓﯿﻄﻠﺐ‬ ‫ﻣﺨﺘﻠﻔﯿﻦ‬ ‫اﻟﺮﻗﻤﯿﻦ‬ ‫ھﺬﯾﻦ‬ ‫ﯾﺨﺘﺎر‬ ً‫ﻼ‬‫ﻓﻤﺜ‬ ‫ﺑﯿﻨﮭﻤﺎ‬ ‫اﻟﺒﺤﺚ‬ ‫اﻟﺠﮭﺎز‬: 212.224.123.10 212.224.123.100 ‫رﻗﻤﯿﻦ‬ ‫آﺧﺮ‬ ‫ﻻﺣﻆ‬‫وھﻤﺎ‬:١٠‫و‬١٠٠ ‫ﻣﻨﻔﺬ‬ ‫ﯾﺤﻮي‬ ‫ﻛﻤﺒﯿﻮﺗﺮ‬ ‫ﻋﻦ‬ ‫اﻟﺒﺤﺚ‬ ‫ﻣﻨﮫ‬ ‫ﻓﯿﻄﻠﺐ‬)‫ﻛﻤﺒﯿﻮﺗﺮ‬‫ﻣﻀﺮوب‬(‫أﺟﮭﺰة‬ ‫ﺑﯿﻦ‬‫ﺑﻲ‬ ‫اﻵي‬ ‫رﻗﻤﻲ‬ ‫ﺑﯿﻦ‬ ‫اﻟﻤﻮﺟﻮدة‬ ‫اﻟﻜﻤﺒﯿﻮﺗﺮ‬ ‫أدرس‬‫اﻟﺘﺎﻟﯿﯿﻦ‬:٢١٢٫٢٢٤٫١٢٣٫١٠‫و‬212.224.123.100‫وھﻲ‬‫اﻟﺒﺤﺚ‬ ‫اﻟﮭﺎﻛﺮ‬ ‫ﻣﻨﮫ‬ ‫ﻃﻠﺐ‬ ‫اﻟﺘﻲ‬ ‫اﻷﺟﮭﺰة‬‫ﺑﯿﻨﮭﺎ‬! ‫ﺑﻌﺪھﺎ‬‫ﺗﻢ‬ ‫اﻟﺬي‬ ‫اﻟﻨﻄﺎق‬ ‫ﺿﻤﻦ‬ ‫ﯾﻘﻊ‬ ‫ﻣﻀﺮوب‬ ‫ﻛﻤﺒﯿﻮﺗﺮ‬ ‫ﺑﺄي‬ ‫اﻟﺨﺎص‬ ‫ﺑﻲ‬ ‫اﻵي‬ ‫رﻗﻢ‬ ‫ﺑﺈﻋﻄﺎﺋﮫ‬ ‫اﻟﺒﺮﻧﺎﻣﺞ‬ ‫ﯾﻘﻮم‬‫ﺗﺤﺪﯾﺪه‬‫ﻣﺜﻞ‬: 212.224.123.50 212.224.123.98 212.224.123.33 212.224.123.47

٨ ‫أرﻗﺎم‬ ‫ھﻲ‬ ‫ھﺬه‬ ‫أن‬ ‫ﻓﯿﺨﺒﺮه‬‫اﻟﮭﺎﻛﺮ‬ ‫ﻓﯿﺴﺘﻄﯿﻊ‬ ‫ﺗﺠﺴﺲ‬ ‫ﻣﻠﻔﺎت‬ ‫أو‬ ‫ﻣﻨﺎﻓﺬ‬ ‫ﺗﺤﻮي‬ ‫اﻟﺘﻲ‬ ‫اﻟﻤﻀﺮوﺑﺔ‬ ‫ﺑﺎﻷﺟﮭﺰة‬ ‫اﻟﺨﺎﺻﺔ‬ ‫ﺑﻲ‬ ‫اﻵي‬ ‫اﻷﺟﮭﺰة‬ ‫إﻟﻰ‬ ‫اﻟﺪﺧﻮل‬ ‫ﺛﻢ‬ ‫وﻣﻦ‬ ‫اﻟﺘﺠﺴﺲ‬ ‫ﺑﺮﻧﺎﻣﺞ‬ ‫ﻓﻲ‬ ‫ووﺿﻌﮫ‬ ‫ﺑﻲ‬ ‫اﻵي‬ ‫رﻗﻢ‬ ‫أﺧﺬ‬ ‫ﻣﻦ‬ ‫ﺑﻌﺪھﺎ‬‫اﻟﻤﻀﺮوﺑﺔ‬! ‫؟‬ ‫ﺍﳍﺎﻛﺮﺯ‬ ‫ﺑﺮﺍﻣﺞ‬ ‫ﺃﺷﻬﺮ‬ ‫ﻫﻲ‬ ‫ﻣﺎ‬ Zone alarm MacAfee firewall The Cleaner ‫ﺍﳍﺎﻛﺮﺯ‬ ‫ﻣﻦ‬ ‫ﺍﳊﻤﺎﻳﺔ‬ ‫ﺑﺮﺍﻣﺞ‬ ‫ﻭﺃﻓﻀﻞ‬ ‫ﺃﺷﻬﺮ‬ ‫ﻭﻣﻦ‬: Zone Alarm Lockdown 2000 Jammer Internet Alert 99 Tiny Personal Firewall ‫اﻟﻄﺮﯾﻘﺔ‬‫اﻟﺜﺎﻧﯿﺔ‬:‫اﻟﻨﻈﺎم‬ ‫ﺗﺴﺠﯿﻞ‬ ‫ﻣﻠﻒ‬ ‫ﺑﻮاﺳﻄﺔ‬Registry: -‫اﻧﻘﺮ‬‫اﻟﺒﺪء‬ ‫زر‬ ‫ﻋﻠﻰ‬Start . -‫اﻟﺘﺸﻐﯿﻞ‬ ‫ﺧﺎﻧﺔ‬ ‫ﻓﻲ‬ ‫أﻛﺘﺐ‬Run‫اﻷﻣﺮ‬: regedit -‫ﻗﺎﺋﻤﺔ‬ ‫ﻓﻲ‬ ‫اﻟﺘﺮﺗﯿﺐ‬ ‫ﺣﺴﺐ‬ ‫اﻟﺘﺎﻟﯿﺔ‬ ‫اﻟﻤﺠﻠﺪات‬ ‫اﻓﺘﺢ‬Register Editor : - HKEY_LOCAL_MACHINE - Software - Microsoft - Windows - Current Version - Run -‫اﻟﻨﻈﺎم‬ ‫ﺗﺴﺠﯿﻞ‬ ‫ﻧﺎﻓﺬة‬ ‫ﻣﻦ‬ ‫واﻵن‬Registry Editor‫اﻧﻈﺮ‬‫إﻟﻲ‬‫ﻗﺎﺋﻤﺔ‬ ‫ﺗﺤﺖ‬ ‫ﺳﺘﺸﺎھﺪ‬ ‫اﻟﻤﻘﺴﻮﻣﺔ‬ ‫ﺑﺎﻟﺸﺎﺷﺔ‬ ‫اﻟﻨﺎﻓﺬة‬ ‫ﯾﻤﯿﻦ‬ Names‫اﻟﺘﻲ‬ ‫اﻟﻤﻠﻔﺎت‬ ‫أﺳﻤﺎء‬‫ﻗﺎﺋﻤﺔ‬ ‫ﻓﻲ‬ ‫وﯾﻘﺎﺑﻠﮭﺎ‬ ‫اﻟﺘﺸﻐﯿﻞ‬ ‫ﺑﺪء‬ ‫ﻗﺎﺋﻤﺔ‬ ‫ﻣﻊ‬ ‫ﺗﻌﻤﻞ‬Data‫اﻟﻤﻠﻔﺎت‬ ‫ﻋﻨﺎوﯾﻦ‬. -‫ﻻﺣﻆ‬‫ﺑﺎﻟـ‬ ‫ﻋﻨﻮان‬ ‫ﻻﯾﻘﺎﺑﻠﺔ‬ ‫ﻣﻠﻒ‬ ‫وﺟﺪت‬ ‫ﻓﺈن‬ ‫ﺟﯿﺪا‬ ‫اﻟﻤﻠﻔﺎت‬Data‫أو‬‫ﻇﮭﺮ‬ ‫ﻗﺪ‬‫أﻣﺎﻣﮫ‬‫ﺻﻐﯿﺮ‬ ‫ﺳﮭﻢ‬<---‫إذ‬ ‫ﺗﺠﺴﺲ‬ ‫ﻣﻠﻒ‬ ‫ﻓﮭﻮ‬ ‫ﺑﺎﻟﻮﯾﻨﺪوز‬ ‫ﻣﻌﯿﻦ‬ ‫ﻋﻨﻮان‬ ‫ﻟﮫ‬ ‫ﻟﯿﺲ‬. -‫ﺑﺎﻟﻀﻐﻂ‬ ‫ﻣﻨﮫ‬ ‫ﺗﺨﻠﺺ‬‫ﺛﻢ‬ ‫ﻟﻠﻔﺎرة‬ ‫اﻷﯾﻤﻦ‬ ‫اﻟﺰر‬ ‫ﻋﻠﻰ‬Delete ‫اﻟﻄﺮﯾﻘﺔ‬‫اﻟﺜﺎﻟﺜﺔ‬:‫ﺑﻮاﺳﻄﺔ‬‫اﻷﻣﺮ‬: msconfig -‫اﻟﺒﺪء‬ ‫زر‬ ‫ﻋﻠﻰ‬ ‫اﻧﻘﺮ‬Start -‫اﻟﺘﺸﻐﯿﻞ‬ ‫ﺧﺎﻧﺔ‬ ‫ﻓﻲ‬ ‫اﻛﺘﺐ‬Run‫اﻟﺘﺎﻟﻲ‬ ‫اﻷﻣﺮ‬: msconfig

٩ -‫ﻧﺎﻓﺬة‬ ‫ﻟﻚ‬ ‫ﺗﻈﮭﺮ‬ ‫ﺳﻮف‬System Configuration Utility -‫ﻗﺴﻢ‬ ‫أﻋﻠﻰ‬ ‫ﻣﻦ‬ ‫اﻟﻨﺎﻓﺬة‬ ‫ھﺬه‬ ‫ﻣﻦ‬ ‫اﺧﺘﺮ‬Start up -‫ﺗﻌﺮض‬ ‫ﺷﺎﺷﺔ‬ ‫ﻟﻚ‬ ‫ﺳﺘﻈﮭﺮ‬‫اﻟﺠﮭﺎز‬ ‫ﺗﺸﻐﯿﻞ‬ ‫ﺑﺪء‬ ‫ﻣﻊ‬ ‫ﻣﺒﺎﺷﺮة‬ ‫اﻟﻌﻤﻞ‬ ‫ﺗﺒﺪأ‬ ‫اﻟﺘﻲ‬ ‫اﻟﺒﺮاﻣﺞ‬. -‫أﻓﺤﺺ‬‫ھﺬه‬‫اﻟﺒﺮاﻣﺞ‬‫ﻓﻘﻢ‬ ‫ﺑﺠﮭﺎزك‬ ‫ﺑﺘﺜﺒﯿﺘﮭﺎ‬ ‫أﻧﺖ‬ ‫ﺗﻘﻢ‬ ‫ﻟﻢ‬ ‫ﻏﺮﯾﺒﺔ‬ ‫ﺑﺮاﻣﺞ‬ ‫ﺑﻮﺟﻮد‬ ‫ﺷﻜﻜﺖ‬ ‫ﻓﺈن‬ ‫ﺑﺎﻟﻨﻈﺮ‬ ‫ﺟﯿﺪا‬‫ﺑﺈﻟﻐﺎء‬‫اﻹﺷﺎرة‬ ‫ﻟﮫ‬ ‫اﻟﻤﻘﺎﺑﻞ‬ ‫اﻟﺼﻐﯿﺮ‬ ‫ﺑﺎﻟﻤﺮﺑﻊ‬ ‫اﻟﻈﺎھﺮة‬‫اﻟﺒﺮﻧﺎﻣﺞ‬ ‫ﻋﻤﻞ‬ ‫أوﻗﻔﺖ‬ ‫ﻗﺪ‬ ‫ﺑﺬﻟﻚ‬ ‫ﻓﺘﻜﻮن‬‫ﻣﺮﻏﻮب‬ ‫اﻟﻐﯿﺮ‬ ‫اﻟﺒﺮاﻣﺞ‬ ‫ﻣﻦ‬ ‫ﻏﯿﺮه‬ ‫أو‬ ‫اﻟﺘﺠﺴﺴﻲ‬ ‫ﺑﮭﺎ‬. ‫اﻟﺮاﺑﻌﺔ‬ ‫اﻟﻄﺮﯾﻘﺔ‬:‫ﺑﻮاﺳﻄﺔ‬‫اﻟﺪوس‬ ‫ﻣﺸﻐﻞ‬Dos : ‫ھﺬه‬‫ﻣﻠﻔﺎت‬ ‫ﻹﻇﮭﺎر‬ ‫اﻟﻮﯾﻨﺪوز‬ ‫ﻇﮭﻮر‬ ‫ﻗﺒﻞ‬ ‫ﺗﺴﺘﺨﺪم‬ ‫ﻛﺎﻧﺖ‬ ‫اﻟﻄﺮﯾﻘﺔ‬‫ﻣﻦ‬ ‫وھﻲ‬ ‫واﻟﺘﺮوﺟﺎﻧﺰ‬ ‫اﻟﺒﺎﺗﺶ‬ ‫ﻣﺜﻞ‬ ‫اﻟﺘﺠﺴﺲ‬‫أﺳﮭﻞ‬‫اﻟﻄﺮق‬: -‫ﻣﺤﺚ‬ ‫ﻣﻦ‬ ‫اﻟﺪوس‬ ‫اﻓﺘﺢ‬MSDos‫ﺑ‬‫اﻟﺒﺪء‬ ‫ﻘﺎﺋﻤﺔ‬Start -‫اﻟﺘﺎﻟﻲ‬ ‫اﻷﻣﺮ‬ ‫أﻛﺘﺐ‬: C:/Windowsdir patch.* e -‫اﻟﺘﺎﻟﯿﺔ‬ ‫ﺑﺎﻟﻄﺮﯾﻘﺔ‬ ‫ﺑﻤﺴﺤﺔ‬ ‫ﻓﻘﻢ‬ ‫اﻟﺒﺎﺗﺶ‬ ‫ﻣﻠﻒ‬ ‫وﺟﺪت‬ ‫إن‬: C:Windowsdelete patch.* ‫ﻣﻊ‬ ‫ﻣﻮاﻗﻒ‬‫اﻟﮭﺎﻛﺮز‬ ‫ﻣﺎ‬ ‫ﯾﺸﺎھﺪ‬ ‫وأﺧﺬ‬ ‫اﻟﻔﺘﯿﺎت‬ ‫ﻹﺣﺪى‬ ‫اﻟﺸﺨﺼﻲ‬ ‫اﻟﺠﮭﺎز‬ ‫ﻋﻠﻰ‬ ‫دﺧﻞ‬ ‫اﻟﮭﺎﻛﺮز‬ ‫أﺣﺪ‬‫ا‬ ‫وﻟﻔﺖ‬ ‫وﻣﻠﻔﺎت‬ ‫ﺻﻮر‬ ‫ﻣﻦ‬ ‫ﯾﺤﺘﻮﯾﮫ‬‫أن‬ ‫ﻧﺘﺒﺎھﮫ‬ ‫اﻟﺘﺼﻮﯾﺮ‬ ‫أﻣﺮ‬ ‫ﻓﺄﺻﺪر‬ ‫ﺑﺎﻟﺠﮭﺎز‬ ‫ﻣﻮﺻﻠﺔ‬ ‫اﻟﻜﺎﻣﯿﺮا‬‫ﻓﯿﮭﺎ‬ ‫ﯾﺨﺒﺮھﺎ‬ ‫رﺳﺎﻟﺔ‬ ‫ﻟﮭﺎ‬ ‫أرﺳﻞ‬ ‫ﺛﻢ‬ ‫اﻟﻜﻤﺒﯿﻮﺗﺮ‬ ‫ﺗﺴﺘﺨﺪم‬ ‫وھﻲ‬ ‫ﯾﺸﺎھﺪھﺎ‬ ‫ﻓﺄﺧﺬ‬ ً‫ا‬‫ﺟﺪ‬ ‫ﺟﻤﯿﻠﺔ‬ ‫أﻧﮭﺎ‬‫وﻟﻜﻦ‬ ً‫ا‬‫ﺟﺪ‬)‫اﻟﻤﻜﯿﺎج‬ ‫ﻛﻤﯿﺔ‬ ‫ﻣﻦ‬ ‫ﺗﻘﻠﻞ‬ ‫ﻟﻮ‬ ‫رﯾﺖ‬ ‫ﯾﺎ‬(!! ‫اﻟﻤﺤﺘﺮﻓﯿﻦ‬ ‫اﻟﮭﺎﻛﺮز‬ ‫أﺣﺪ‬‫ﺑﻜ‬ ‫وﯾﺘﺴﻠﻞ‬ ‫اﻹﻧﺘﺮﻧﺖ‬ ‫ﻋﺒﺮ‬ ‫اﻟﺒﻨﻮك‬ ‫ﻣﻮاﻗﻊ‬ ‫ﻋﻠﻰ‬ ‫ﯾﺪﺧﻞ‬ ‫أن‬ ‫اﻋﺘﺎد‬‫اﻷرﺻﺪة‬ ‫إﻟﻰ‬ ‫ﺳﻼﺳﺔ‬ ‫ﻞ‬‫واﻟﺤﺴﺎﺑﺎت‬ ‫اﻟﻨﺎس‬ ‫أﻗﻞ‬ ‫رﺻﯿﺪ‬ ‫ﻓﻲ‬ ‫اﻟﺪوﻻرات‬ ‫ﻣﺠﻤﻮع‬ ‫وﯾﻀﻊ‬ ‫ﻏﻨﻲ‬ ‫ﻛﻞ‬ ‫ﻣﻦ‬ ‫واﺣﺪ‬ ‫دوﻻر‬ ‫ﻓﯿﺄﺧﺬ‬ً‫ﺎ‬‫ﺣﺴﺎﺑ‬!! ‫اﻟﺨﻠﯿﻌﺔ‬ ‫اﻟﺼﻮر‬ ‫ﺑﺤﺬف‬ ‫وﯾﻘﻮم‬ ‫اﻟﻨﺎس‬ ‫أﺟﮭﺰة‬ ‫إﻟﻰ‬ ‫ﯾﺪﺧﻞ‬ ‫اﻟﺸﺒﺎب‬ ‫ﻣﻦ‬ ‫واﺣﺪ‬‫ﺑﮭﺬا‬ ‫ﻧﻔﺴﮫ‬ ‫وﯾﻌﺘﺒﺮ‬ ‫اﻟﺠﻨﺴﯿﺔ‬ ‫واﻟﻤﻠﻔﺎت‬)‫ﻣﺠﺮد‬ ‫ﺧﯿﺮ‬ ‫ﻓﺎﻋﻞ‬(‫أﻧﮫ‬ ‫ﯾﻨﺴﻰ‬ ‫ﺑﮭﺬا‬ ‫وھﻮ‬)‫ﺣﺮاﻣﻲ‬‫وﻣﺘﺴﻠﻞ‬ ‫وﻟﺺ‬(!! ‫ﻣﻮﻗﻊ‬ ‫ﻣﺜﻞ‬ ‫اﻟﻜﺒﯿﺮة‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫اﺧﺘﺮاق‬ ‫ﻣﺤﺎوﻟﺔ‬ ‫ﻋﻠﻰ‬ ‫اﻟﮭﺎﻛﺮز‬ ‫اﻋﺘﺎد‬‫ﻓﻲ‬ ‫ﯾﻔﺸﻠﻮن‬ ‫ﻣﺎ‬ ً‫ﺎ‬‫داﺋﻤ‬ ‫وﻟﻜﻨﮭﻢ‬ ‫ﻣﺎﯾﻜﺮوﺳﻮﻓﺖ‬ ‫وﻣﻮﻗﻊ‬ ‫اﻟﯿﺎھﻮ‬ ‫اﻟﺠﺪران‬ ‫ﺑﺴﺒﺐ‬ ‫ھﺬه‬ ‫ﻣﺮاﻣﯿﮭﻢ‬‫ﻣﻦ‬ ‫ھﺎﻛﺮ‬ ‫أي‬ ‫ﻟﻤﻨﻊ‬ ‫ﺗﺘﺒﻌﮭﺎ‬ ‫اﻟﺘﻲ‬ ‫اﻟﻀﺨﻤﺔ‬ ‫واﻹﺟﺮاءات‬ ‫اﻟﺸﺮﻛﺎت‬ ‫ھﺬه‬ ‫ﺗﻀﻌﮭﺎ‬ ‫اﻟﺘﻲ‬ ‫اﻟﻨﺎرﯾﺔ‬‫دﺧﻮل‬ ‫اﺧﺘﺮا‬ ‫ﻓﻲ‬ ‫اﻟﮭﺎﻛﺮ‬ ‫ﯾﻨﺠﺢ‬ ‫ھﺬا‬ ‫وﻣﻊ‬ ‫اﻟﻨﻈﺎم‬‫دﻗﺎﺋﻖ‬ ‫ﺧﻤﺲ‬ ‫ﻣﻦ‬ ‫أﻗﻞ‬ ‫ﺧﻼل‬ ‫وﻟﻜﻦ‬ ‫اﻟﻨﻈﺎم‬ ‫ق‬‫ﯾﺴﺘﻄﯿﻊ‬‫ﻣﻮﻇﻔﻮ‬‫إﻋﺎدة‬ ‫ﻣﻦ‬ ‫اﻟﺸﺮﻛﺔ‬ ‫ﻣﺠﺮاھﺎ‬ ‫إﻟﻰ‬ ‫اﻷﻣﻮر‬!! ‫واﻟﺘﺠﺴﺲ‬ ‫اﻻﺧﺘﺮاق‬ ‫ﯾﻌﺪ‬‫أن‬ ‫اﻟﻜﺮﯾﻢ‬ ‫أﺧﻲ‬ ‫ﺗﺴﺘﻐﺮب‬ ‫ﻻ‬ ‫وﻟﺬا‬ ‫اﻟﻌﺎﻟﻢ‬ ‫دول‬ ‫ﻣﻦ‬ ‫اﻟﻜﺜﯿﺮ‬ ‫ﻓﻲ‬ ‫اﻟﻘﺎﻧﻮن‬ ‫ﻋﻠﯿﮭﺎ‬ ‫ﯾﺤﺎﺳﺐ‬ ‫ﺟﺮﯾﻤﺔ‬‫ﺗﺮى‬ ‫ﺧ‬ ‫ﺑﻤﺠﺮد‬ ‫أﻧﮫ‬ ‫اﻟﻔﺮق‬ ‫وﻟﻜﻦ‬ ‫واﻟﻠﺼﻮص‬ ‫اﻟﻤﺨﺪرات‬ ‫وﻣﺮوج‬ ‫اﻟﻘﺎﺗﻞ‬ ‫ﺑﺠﻮار‬ ‫اﻟﮭﺎﻛﺮ‬‫اﻟﮭﺎﻛﺮ‬ ‫ﺮوج‬ً‫ﻼ‬‫ﺣﺎﻓ‬ ً‫ﻻ‬‫اﺳﺘﻘﺒﺎ‬ ‫ﯾﺠﺪ‬ ‫اﻟﺴﺠﻦ‬ ‫ﻣﻦ‬ ‫ﺗﻮﻇﯿﻒ‬ ‫إﻟﻰ‬ ‫ﺗﺴﺎرع‬ ‫اﻟﺘﻲ‬ ‫اﻟﻜﺒﺮى‬ ‫اﻟﻌﺎﻟﻤﯿﺔ‬ ‫اﻟﺸﺮﻛﺎت‬ ‫ﻣﻦ‬‫وﻛﺬﻟﻚ‬ ‫اﻟﮭﺎﻛﺮز‬ ‫ﻣﺤﺎرﺑﺔ‬ ‫ﻓﻲ‬ ‫ﺧﺒﺮﺗﮭﻢ‬ ‫ﻣﻦ‬ ‫اﻻﺳﺘﻔﺎدة‬ ‫ﺑﻐﺮض‬ ‫اﻟﮭﺎﻛﺮز‬ ‫ﻣﻌﻠﻮﻣﺎﺗﮭﻢ‬ ‫ﻣﻦ‬ ‫ﻟﻼﺳﺘﻔﺎدة‬‫اﻗﺘﺤﺎﻣﮭﺎ‬ ‫ﻋﻦ‬ ‫اﻟﮭﺎﻛﺮز‬ ‫ﯾﻌﺠﺰ‬ ‫وأﻧﻈﻤﺔ‬ ‫ﺑﺮاﻣﺞ‬ ‫ﺑﻨﺎء‬ ‫ﻓﻲ‬.. ‫اﻟﮭﺎﻛﺮز‬ ‫ﻛﻞ‬ ‫ﺑﮭﺎ‬ ‫ﯾﺆﻣﻦ‬ ‫ﺣﻜﻤﺔ‬:‫ﻧﻈ‬ ‫ﯾﻮﺟﺪ‬ ‫ﻻ‬‫ﯾﺴﺘﻄﯿﻊ‬ ‫ﻻ‬ ‫ﺟﮭﺎز‬ ‫ﯾﻮﺟﺪ‬ ‫وﻻ‬ ‫ﻓﺠﻮة‬ ‫ﯾﺤﻮي‬ ‫ﻻ‬ ‫ﺟﮭﺎز‬ ‫ﯾﻮﺟﺪ‬ ‫وﻻ‬ ‫ﻣﻨﺎﻓﺬ‬ ‫ﺑﺪون‬ ‫ﺗﺸﻐﯿﻞ‬ ‫ﺎم‬ ‫اﻗﺘﺤﺎﻣﮫ‬ ‫ھﺎﻛﺮ‬!! ‫ھﻢ‬ ‫اﻟﻌﺎﻟﻢ‬ ‫ﻓﻲ‬ ‫اﻟﮭﺎﻛﺮ‬ ‫وأﻗﻮى‬ ‫أﻏﻠﺐ‬‫ﻣﺒﺮﻣﺠﻮ‬‫اﻟﻜﻤﺒﯿﻮﺗﺮ‬‫وﻣﮭﻨﺪﺳﻮ‬‫اﻟﺸﺒﺎب‬ ‫ھﻢ‬ ‫ﻣﻨﮭﻢ‬ ‫اﻷﻗﻮى‬ ‫وﻟﻜﻦ‬ ‫واﻟﺸﺒﻜﺎت‬ ‫اﻻﺗﺼﺎل‬ ‫وروح‬ ‫ﺑﺎﻟﺘﺤﺪي‬ ‫اﻟﻤﺘﺴﻠﺤﻮن‬ ‫واﻟﻤﺮاھﻘﻮن‬‫ﻟﺘﻌﻠﻢ‬ ‫وﻗﺘﮭﻢ‬ ‫ﯾﻔﺮﻏﻮن‬ ‫واﻟﺬﯾﻦ‬ ‫اﻟﻤﻐﺎﻣﺮة‬‫واﻟﺘﻄﻔﻞ‬ ‫اﻟﺘﺠﺴﺲ‬ ‫ﻋﻠﻢ‬ ‫ﻓﻲ‬ ‫واﻟﻤﺰﯾﺪ‬ ‫اﻟﻤﺰﯾﺪ‬ ‫ﻋﻠﻰ‬‫اﻟﻜﻤﺒﯿﻮﺗﺮ‬ ‫ﺷﺮﻛﺎت‬ ‫أﻛﺒﺮ‬ ‫أو‬ ‫اﻟﺴﺠﻦ‬ ‫إﻟﻰ‬ ‫اﻟﻐﺎﻟﺐ‬ ‫ﻓﻲ‬ ‫ھﺆﻻء‬ ‫ﻛﻞ‬ ‫ﻣﺼﯿﺮ‬ ً‫ﺎ‬‫وﻋﻤﻮﻣ‬ ، ‫اﻟﻨﺎس‬‫اﻟﻌﺎﻟﻢ‬ ‫ﻓﻲ‬ ‫واﻟﺒﺮﻣﺠﺔ‬!! ‫اﻹﻧﺘﺮﻧﺖ‬ ‫ﺳﺎﺣﺎت‬ ‫إﻟﻰ‬ ‫اﻟﻤﻌﺎرك‬ ‫ﺳﺎﺣﺎت‬ ‫ﻣﻦ‬ ‫اﻟﺤﺮوب‬ ‫ﺗﺤﻮﻟﺖ‬ ‫اﻵن‬‫اﻟﺠﻨﻮد‬ ‫وأﻋﺘﻰ‬ ‫أﻗﻮى‬ ‫ﻣﻦ‬ ‫اﻟﮭﺎﻛﺮز‬ ‫وأﺻﺒﺢ‬ ‫واﻟﻜﻤﺒﯿﻮﺗﺮ‬ ‫اﻟ‬ ‫ﺗﺴﺘﺨﺪﻣﮭﻢ‬ ‫اﻟﺬﯾﻦ‬‫وﺧﺎﺻﺔ‬ ‫ﺤﻜﻮﻣﺎت‬)‫اﻟﻤﺨﺎﺑﺮات‬(‫وﺳﺮﻗﺔ‬ ‫اﻟﻌﺪو‬ ‫وأﻧﻈﻤﺔ‬ ‫أﺟﮭﺰة‬ ‫إﻟﻰ‬ ‫ﺑﺨﻔﯿﺔ‬ ‫اﻟﺘﺴﻠﻞ‬ ‫ﯾﺴﺘﻄﯿﻌﻮن‬ ‫ﺣﯿﺚ‬ ‫ﻻ‬ ‫ﻣﻌﻠﻮﻣﺎت‬‫ذﻟﻚ‬ ‫وﻏﯿﺮ‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫ﺗﺪﻣﯿﺮ‬ ‫وﻛﺬﻟﻚ‬ ‫ﺑﺜﻤﻦ‬ ‫ﺗﻘﺪر‬..‫اﻟﺘﻲ‬ ‫اﻹﻟﻜﺘﺮوﻧﯿﺔ‬ ‫اﻟﺤﺮوب‬ ‫ﻧﻨﺴﻰ‬ ‫ﻻ‬ ‫وﻛﺬﻟﻚ‬‫ﺑﯿﻦ‬ ‫رﺣﺎھﺎ‬ ‫ﺗﺪور‬

١٠ ‫و‬ ‫واﻟﺮوس‬ ‫واﻷﻣﺮﯾﻜﺎن‬ ‫واﻟﯿﮭﻮد‬ ‫اﻟﻌﺮب‬...‫ﯾﺤﻔﻈﻨﺎ‬ ‫رﺑﻨﺎ‬! ‫ﻣﻦ‬‫اﻟﺒﺮاﻣﺞ‬ ‫أﻗﺪم‬‫ﻣﺴﺘﺨﺪﻣﻲ‬ ‫ﺑﯿﻦ‬ ‫ﺷﯿﻮﻋﺎ‬ ‫اﻷﻛﺜﺮ‬ ‫وھﻮ‬ ‫ﺑﺎﻟﺴﯿﺮﻓﺮات‬ ‫اﻻﺧﺘﺮاق‬ ‫ﺳﺎﺣﺔ‬ ‫ﻓﻲ‬‫ﺑﮫ‬ ‫ﺑﺮﻧﺎﻣﺞ‬ ‫وھﻮ‬ ‫ﺷﺎت‬ ‫اﻟﻤﺎﯾﻜﺮوﺳﻮﻓﺖ‬ ‫اﻟﺘﺤﻜﻢ‬ ‫ﻣﻦ‬ ‫اﻟﮭﺎﻛﺮ‬ ‫ﺗﻤﻜﻦ‬ ‫اﻟﺘﻲ‬ ‫اﻹﻣﻜﺎﻧﯿﺎت‬ ‫ﻣﻦ‬ ‫اﻟﻌﺪﯾﺪ‬‫وﻛﻞ‬ ‫ﺑﺎس‬ ‫اﻟﻨﺖ‬ ‫ﻣﻦ‬ ‫ﺣﺪاﺛﺔ‬ ‫أﻛﺜﺮ‬ ‫ﻣﺨﺘﻠﻔﺔ‬ ‫ﻧﺴﺦ‬ ‫وﺗﻮﺟﺪ‬ ‫اﻟﻀﺤﯿﺔ‬ ‫ﺑﺠﮭﺎز‬ ‫ﻧﺴﺨﺔ‬ً‫ا‬‫ﺗﻄﻮر‬ ‫أﻛﺜﺮ‬ ‫ﻣﻨﮭﺎ‬‫اﻷﺧﺮى‬ ‫ﻣﻦ‬.. SUB 7 ‫وﻏﻨ‬ ‫ﻣﻤﺘﺎز‬ ‫ﺑﺮﻧﺎﻣﺞ‬‫ﻋﻦ‬ ‫ﻲ‬‫اﻟﺘﻌﺮﯾﻒ‬...‫ﺗﺴﺘﻄﯿﻊ‬‫ﻃﺮﯾﻘﺔ‬ ‫او‬ ‫ﺷﻜﻞ‬ ‫ﺗﻐﯿﯿﺮ‬ ‫ﻣﻦ‬ ‫ﺳﻮاء‬ ‫ﺗﺸﺎء‬ ‫ﻛﯿﻔﻤﺎ‬ ‫ﻟﯿﻌﻤﻞ‬ ‫اﻟﺴﯿﺮﻓﺮ‬ ‫وﺗﻨﺴﯿﻖ‬ ‫اﻟﺘﺤﻜﻢ‬ ‫ﻣﻤﺘﺎز‬ ‫وھﻮ‬ ‫ﻋﻤﻞ‬‫اﻻﺧﺘﺮاق‬ ‫ﻣﺠﺎل‬ ‫ﻓﻲ‬‫ﺑﺎﻟﺒﺮاﻣﺞ‬... Hackers Utility ‫ورھﯿﺐ‬ ‫ﻣﻔﯿﺪ‬ ‫ﺑﺮﻧﺎﻣﺞ‬‫ﺑﺮاﻣﺞ‬ ‫ﻣﺨﺘﻠﻒ‬ ‫إﻣﻜﺎﻧﯿﺎت‬ ‫وأﻓﻀﻞ‬ ‫أﻏﻠﺐ‬ ‫ﯾﻤﺘﻠﻚ‬ ‫أﻧﮫ‬ ‫ﺣﯿﺚ‬ ‫واﻟﻤﺤﺘﺮﻓﯿﻦ‬ ‫اﻟﻤﺒﺘﺪﺋﯿﻦ‬ ‫وﺧﺎﺻﺔ‬ ‫ﻟﻠﮭﺎﻛﺮز‬ ‫اﻟﮭﺎﻛ‬‫اﻟﻤﻠﻔﺎت‬ ‫ﺗﺸﻔﯿﺮ‬ ‫وﻓﻚ‬ ‫اﻟﻤﻀﻐﻮﻃﺔ‬ ‫ﻟﻠﻤﻠﻔﺎت‬ ‫اﻟﺴﺮﯾﺔ‬ ‫اﻟﻜﻠﻤﺎت‬ ‫ﻛﺴﺮ‬ ‫ﺧﻼﻟﮫ‬ ‫ﻣﻦ‬ ‫وﯾﻤﻜﻦ‬ ‫ﺮز‬‫ﺗﺤﻮﯾﻞ‬ ‫وﻛﺬﻟﻚ‬ ‫اﻟﻤﺸﻔﺮة‬ ‫اﻟﺴﺮﯾﺔ‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫ﻋﻨﺎوﯾﻦ‬‫إﻟﻰ‬‫اﻟﻌﺪﯾﺪ‬ ‫ﺑﮫ‬ ‫ﻛﻤﺎ‬ ‫واﻟﻌﻜﺲ‬ ‫ﺑﻲ‬ ‫آي‬ ‫أرﻗﺎم‬‫ﻣﻦ‬ ‫اﻟﻜﺜﯿﺮ‬ ‫ﻋﻨﮭﺎ‬ ‫ﯾﺒﺤﺚ‬ ‫اﻟﺘﻲ‬ ‫واﻟﻤﻤﯿﺰات‬ ‫اﻹﻣﻜﺎﻧﯿﺎت‬ ‫ﻣﻦ‬ ‫اﻟﻌﺪﯾﺪ‬ ‫اﻟﮭﺎﻛﺮز‬.. Back Orifice ‫اﻟﺘﻌﺮﯾﻒ‬ ‫ﻋﻦ‬ ‫ﻏﻨﻲ‬ ‫ﺑﺮﻧﺎﻣﺞ‬‫ﻣﺴﺘﺨﺪﻣﻲ‬ ‫أﺟﮭﺰة‬ ‫ﺑﯿﻦ‬ ‫اﻧﺘﺸﺎر‬ ‫ﻣﻦ‬ ‫ﻟﻔﯿﺮوﺳﮫ‬ ‫ﻟﻤﺎ‬‫أﺣﺪ‬ ‫اﺧﺘﺮاق‬ ‫ﺗﺴﺘﻄﯿﻊ‬ ‫ﺣﺘﻰ‬ ‫وﻟﻜﻦ‬ ‫اﻻﻧﺘﺮﻧﺖ‬ ‫ﺑﻨﻔﺲ‬ ً‫ﺎ‬‫ﻣﻠﻮﺛ‬ ‫ﺟﮭﺎزك‬ ‫ﯾﻜﻮن‬ ‫أن‬ ‫ﻻﺑﺪ‬ ‫اﻷﺟﮭﺰة‬‫اﻟﻔﯿﺮوس‬‫اﻟﻤﺴﺘﺨﺪم‬... Deep Throat 2.0 ‫اﻟﻤﻠﻒ‬ ‫ﺑﻤﺴﺢ‬ ‫اﻟﺒﺮﻧﺎﻣﺞ‬ ‫ھﺬا‬ ‫ﯾﻘﻮم‬)‫ﺳﯿﺴﺘﺮي‬(‫أ‬ ‫وھﻲ‬ ‫ﻣﯿﺰة‬ ‫ﻓﯿﮫ‬ ‫اﻟﺒﺮﻧﺎﻣﺞ‬ ‫وھﺬا‬ ‫ﺑﮫ‬ ‫اﻟﺨﺎص‬ ‫ﺑﺎﻟﺴﯿﺮﻓﺮ‬ ‫ﺑﺎﺳﺘﺒﺪاﻟﮫ‬ ‫وﯾﻘﻮم‬‫ﻧﻚ‬ ‫ﺗﺴﺘﻄﯿﻊ‬‫اﻟﻤﺘﺤﻜﻢ‬ ‫وﺑﺈﻣﻜﺎن‬ ‫ﺗﺮﻏﺐ‬ ‫ﻣﻜﺎن‬ ‫ﻷي‬ ‫ﺑﺘﻮﺟﯿﮭﮫ‬ ‫وﺗﻘﻮم‬ ‫اﻟﻀﺤﯿﺔ‬ ‫ﯾﺰورھﺎ‬ ‫اﻟﻠﻲ‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫ﻓﻲ‬ ‫اﻟﺘﺤﻜﻢ‬‫اﻟﺸﺎﺷﺔ‬ ‫وﻓﺘﺢ‬ ‫ﻏﻠﻖ‬ ‫ﺗﻲ‬ ‫اﻹف‬ ‫ﺑﺮﻧﺎﻣﺞ‬ ‫ﻃﺮﯾﻖ‬ ‫ﻋﻦ‬ ‫اﺳﺘﺨﺪاﻣﮫ‬ ‫وﻛﺬﻟﻚ‬‫ﺑﻲ‬.. Porter ‫ﯾﻌﻤﻞ‬ ‫ﺑﺮﻧﺎﻣﺞ‬Scan‫ﻋﻠﻰ‬‫أرﻗﺎم‬‫اﻟـ‬IP‫اﻟـ‬ ‫و‬Ports pinger ‫ﯾﻌﻤﻞ‬ ‫ﺑﺮﻧﺎﻣﺞ‬(Ping)‫اﻟﻀ‬ ‫ﻛﺎن‬ ‫إذا‬ ‫ﻟﻤﻌﺮﻓﺔ‬‫أم‬ ‫ﺑﺎﻹﻧﺘﺮﻧﺖ‬ ً‫ﻼ‬‫ﻣﺘﺼ‬ ‫اﻟﻤﻮﻗﻊ‬ ‫أو‬ ‫ﺤﯿﺔ‬‫ﻻ‬... ultrascan-15.exe ‫ﻟﻌﻤﻞ‬ ‫ﺑﺮﻧﺎﻣﺞ‬ ‫أﺳﺮع‬Scan‫ﺟﮭﺎز‬ ‫ﻋﻠﻰ‬‫ﻣﻨﮭﺎ‬ ‫إﻟﯿﮫ‬ ‫اﻟﺪﺧﻮل‬ ‫ﯾﻤﻜﻨﻚ‬ ‫اﻟﺘﻲ‬ ‫اﻟﻤﻔﺘﻮﺣﺔ‬ ‫اﻟﻤﻨﺎﻓﺬ‬ ‫ﻟﻤﻌﺮﻓﺔ‬ ‫اﻟﻀﺤﯿﺔ‬... Zip Cracker

١١ ‫اﻟﻤﻠﻔﺎت‬ ‫ﺳﺮ‬ ‫ﻛﻠﻤﺎت‬ ‫ﻛﺴﺮ‬ ‫ﺧﻼﻟﮫ‬ ‫ﻣﻦ‬ ‫ﺗﺴﺘﻄﯿﻊ‬ ‫اﻟﺼﻐﯿﺮ‬ ‫اﻟﺒﺮﻧﺎﻣﺞ‬ ‫ھﺬا‬‫واﻟﻤﺤﻤﯿﺔ‬ ‫اﻟﻤﻀﻐﻮﻃﺔ‬‫ﺑﺒﺎﺳﻮورد‬.. Girl Friend ‫ﺑﻌﻤﻠﮫ‬ ‫ﻗﺎم‬ ‫ﺑﺮﻧﺎﻣﺞ‬‫ﺑـ‬ ‫ﯾﺪﻋﻰ‬ ‫ﺷﺨﺺ‬)‫اﻟﻌﺎم‬ ‫اﻟﻔﺎﺷﻞ‬(‫اﻟﺴﺮ‬ ‫ﻛﻠﻤﺎت‬ ‫ﺟﻤﯿﻊ‬ ‫ﺳﺮﻗﺔ‬ ‫ھﻲ‬ ‫واﻟﺨﻄﯿﺮة‬ ‫اﻟﺮﺋﯿﺴﯿﺔ‬ ‫وﻣﮭﻤﺘﮫ‬‫ﻓﻲ‬ ‫اﻟﻤﻮﺟﻮدة‬ ‫وﻛﺬﻟﻚ‬ ‫اﻷﯾﻤﯿﻞ‬ ‫ﺑﺎﺳﻮورد‬ ‫ﻓﯿﮭﺎ‬ ‫ﺑﻤﺎ‬ ‫ﺟﮭﺎزك‬‫اﺳﻢ‬‫اﻟﺬي‬ ‫اﻟﺴﺮي‬ ‫واﻟﺮﻣﺰ‬ ‫اﻟﻤﺴﺘﺨﺪم‬‫اﻹﻧﺘﺮﻧﺖ‬ ‫ﻟﺪﺧﻮل‬ ‫ﺗﺴﺘﺨﺪﻣﮫ‬.. ‫ﳚﺐ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻻﺣﺘﻴﺎﻃﺎﺕ‬ ‫ﺃﻫﻢ‬ ‫ﻫﻲ‬ ‫ﻣﺎ‬‫ﺍ‬‫؟‬ ‫ﺍﳍﺎﻛﺮﺯ‬ ‫ﻣﻦ‬ ‫ﻟﻠﺤﻤﺎﻳﺔ‬ ‫ﲣﺎﺫﻫﺎ‬ ١-‫اﻟﮭﺎﻛﺮز‬ ‫ﻣﻦ‬ ‫اﻟﺤﻤﺎﯾﺔ‬ ‫ﺑﺮاﻣﺞ‬ ‫أﺣﺪث‬ ‫اﺳﺘﺨﺪم‬‫ﻣﺘﻘﺎرﺑﺔ‬ ‫ﻓﺘﺮات‬ ‫ﻓﻲ‬ ‫ﺟﮭﺎزك‬ ‫ﻋﻠﻰ‬ ‫وﺷﺎﻣﻞ‬ ‫دوري‬ ‫ﻣﺴﺢ‬ ‫ﺑﻌﻤﻞ‬ ‫وﻗﻢ‬ ‫واﻟﻔﯿﺮوﺳﺎت‬ ‫ﻛﻨﺖ‬ ‫إذا‬ ً‫ﺎ‬‫ﺧﺼﻮﺻ‬‫ﺑﺸﻜﻞ‬ ‫اﻹﻧﺘﺮﻧﺖ‬ ‫ﯾﺴﺘﺨﺪﻣﻮن‬ ‫ﻣﻤﻜﻦ‬‫ﯾﻮﻣﻲ‬.. ٢-‫ﻣﺜﻞ‬ ‫اﻟﻤﺸﺒﻮھﺔ‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫إﻟﻰ‬ ‫ﺗﺪﺧﻞ‬ ‫ﻻ‬‫اﻟﺘ‬ ‫واﻟﻤﻮاﻗﻊ‬ ‫اﻟﺘﺠﺴﺲ‬ ‫ﺗﻌﻠﻢ‬ ‫اﻟﺘﻲ‬ ‫اﻟﻤﻮاﻗﻊ‬‫اﻟﺘﻲ‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫أو‬ ‫اﻟﺤﻜﻮﻣﺎت‬ ‫ﺗﺤﺎرب‬ ‫ﻲ‬ ‫ﺗﺤﻮي‬‫ﻣﻠﻔﺎت‬ ‫إدﺧﺎل‬ ‫ﻓﻲ‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫ھﺬه‬ ‫أﻣﺜﺎل‬ ‫ﯾﺴﺘﺨﺪﻣﻮن‬ ‫اﻟﮭﺎﻛﺮز‬ ‫ﻷن‬ ‫ﺧﻠﯿﻌﺔ‬ ً‫ا‬‫وﺻﻮر‬ ً‫ﺎ‬‫أﻓﻼﻣ‬‫ﯾﺘﻢ‬ ‫ﺣﯿﺚ‬ ‫اﻟﻀﺤﺎﯾﺎ‬ ‫إﻟﻰ‬ ‫اﻟﺘﺠﺴﺲ‬ ‫اﻟﺘﺠﺴﺲ‬ ‫ﻣﻠﻒ‬ ‫ﺗﻨﺼﯿﺐ‬)‫اﻟﺒﺎﺗﺶ‬(‫ﺑﻤﺠﺮد‬ ‫اﻟﺠﮭﺎز‬ ‫ﻓﻲ‬ ً‫ﺎ‬‫ﺗﻠﻘﺎﺋﯿ‬‫اﻟﻤﻮﻗﻊ‬ ‫إﻟﻰ‬ ‫اﻟﺸﺨﺺ‬ ‫دﺧﻮل‬!! ٣-‫ﻣﺼﺪ‬ ‫ﻣﻦ‬ ‫إﻟﻜﺘﺮوﻧﯿﺔ‬ ‫رﺳﺎﻟﺔ‬ ‫أي‬ ‫ﻓﺘﺢ‬ ‫ﻋﺪم‬‫ﻷن‬ ‫ﻣﺠﮭﻮل‬ ‫ر‬‫ﻣﻠﻔﺎت‬ ‫ﻹرﺳﺎل‬ ‫اﻹﻟﻜﺘﺮوﻧﻲ‬ ‫اﻟﺒﺮﯾﺪ‬ ‫رﺳﺎﺋﻞ‬ ‫ﯾﺴﺘﺨﺪﻣﻮن‬ ‫اﻟﮭﺎﻛﺮز‬ ‫اﻟﻀﺤﺎﯾﺎ‬ ‫إﻟﻰ‬ ‫اﻟﺘﺠﺴﺲ‬. ٤-‫أﺛﻨﺎء‬ ‫ﻣﻠﻔﺎت‬ ‫أﯾﺔ‬ ‫اﺳﺘﻘﺒﺎل‬ ‫ﻋﺪم‬)‫اﻟﺸﺎت‬(‫وﺧﺎﺻﺔ‬ ‫ﺑﮭﻢ‬ ‫ﻣﻮﺛﻮق‬ ‫ﻏﯿﺮ‬ ‫أﺷﺨﺎص‬ ‫ﻣﻦ‬‫اﻣﺘﺪاد‬ ‫ﺗﺤﻤﻞ‬ ‫اﻟﻤﻠﻔﺎت‬ ‫ھﺬه‬ ‫ﻛﺎﻧﺖ‬ ‫إذا‬ (exe)‫ﻣﺜﻞ‬(love.exe)‫ذوي‬ ‫ﻣﻦ‬ ‫ﻣﻠﻔﺎت‬ ‫ﺗﻜﻮن‬ ‫أن‬ ‫أو‬‫ﻣﺜﻞ‬ ‫اﻻﻣﺘﺪادﯾﻦ‬(ahmed.pif.jpg)‫اﻟﻤﻠﻔﺎت‬ ‫ھﺬه‬ ‫أﻣﺜﺎل‬ ‫وﺗﻜﻮن‬ ‫ﻣﻠﻔﺎت‬ ‫ﺗﺰرع‬ ‫ﺑﺮاﻣﺞ‬ ‫ﻋﻦ‬ ‫ﻋﺒﺎرة‬‫ﺟﮭﺎزك‬ ‫ﻋﻠﻰ‬ ‫اﻟﺪﺧﻮل‬ ‫ﻣﻦ‬ ‫ﺑﻮاﺳﻄﺘﮭﺎ‬ ‫اﻟﮭﺎﻛﺮز‬ ‫ﻓﯿﺴﺘﻄﯿﻊ‬ ‫ﺟﮭﺎزك‬ ‫ﻓﻲ‬ ‫اﻟﺘﺠﺴﺲ‬‫وﺗﺴﺒﺐ‬‫اﻷذى‬ ‫واﻟﻤﺸﺎﻛﻞ‬‫ﻟﻚ‬.. ٥-‫ﺷﺨﺼﯿﺔ‬ ‫ﻣﻌﻠﻮﻣﺎت‬ ‫ﺑﺄﯾﺔ‬ ‫اﻻﺣﺘﻔﺎظ‬ ‫ﻋﺪم‬‫ﻓﻲ‬‫ﻛﺎﻟﺮﺳﺎﺋﻞ‬ ‫ﺟﮭﺎزك‬ ‫داﺧﻞ‬‫اﻟﻤﮭﻤﺔ‬ ‫اﻟﻤﻠﻔﺎت‬ ‫أو‬ ‫اﻟﻔﻮﺗﻮﻏﺮاﻓﯿﺔ‬ ‫اﻟﺼﻮر‬ ‫أو‬ ‫اﻟﺨﺎﺻﺔ‬ ‫وﻏ‬‫أرﻗﺎم‬ ‫ﻣﺜﻞ‬ ‫ﺑﻨﻜﯿﺔ‬ ‫ﻣﻌﻠﻮﻣﺎت‬ ‫ﻣﻦ‬ ‫ﯿﺮھﺎ‬‫اﻟﺒﻄﺎﻗﺎت‬ ‫أو‬ ‫اﻟﺤﺴﺎﺑﺎت‬‫اﻻﺋﺘﻤﺎﻧﯿﺔ‬.. ٦-‫ﻣﻠﻔﺎﺗﻚ‬ ‫ﻋﻠﻰ‬ ‫ﺳﺮﯾﺔ‬ ‫أرﻗﺎم‬ ‫ﺑﻮﺿﻊ‬ ‫ﻗﻢ‬‫أﻧﺖ‬ ‫وھﻮ‬ ‫ﻓﻘﻂ‬ ‫اﻟﺴﺮي‬ ‫اﻟﺮﻗﻢ‬ ‫ﯾﻌﺮف‬ ‫ﻣﻦ‬ ‫ﺳﻮى‬ ‫ﻓﺘﺤﮭﺎ‬ ‫ﯾﺴﺘﻄﯿﻊ‬ ‫ﻻ‬ ‫ﺣﯿﺚ‬ ‫اﻟﻤﮭﻤﺔ‬. ٧-‫ﺣﺎول‬‫اﻹﻧﺘﺮﻧﺖ‬ ‫ﻋﺒﺮ‬ ‫اﻷﺻﺪﻗﺎء‬ ‫ﻣﻦ‬ ‫ﻣﻌﯿﻦ‬ ‫ﻋﺪد‬ ‫ﻟﻚ‬ ‫ﯾﻜﻮن‬ ‫أن‬ ‫اﻹﻣﻜﺎن‬ ‫ﻗﺪر‬‫وﺗﻮﺧﻲ‬‫اﻟﺼﺪق‬ ‫ﻓﯿﮭﻢ‬‫واﻷ‬‫ﻣﺎﻧﺔ‬‫واﻷﺧﻼق‬. ٨-‫ﻗﺎﺑﻠﺔ‬ ‫ﻓﮭﻲ‬ ‫دورﯾﺔ‬ ‫ﺑﺼﻮرة‬ ‫اﻟﺴﺮ‬ ‫ﻛﻠﻤﺔ‬ ‫ﺗﻐﯿﯿﺮ‬ ً‫ﺎ‬‫داﺋﻤ‬ ‫ﺣﺎول‬‫ﻟﻼﺧﺘﺮاق‬. ٩-‫ﺑﻌﺪ‬ ‫ﺑﺎﻹﻧﺘﺮﻧﺖ‬ ‫اﻟﺘﻮﺻﯿﻞ‬ ‫ﺳﻠﻚ‬ ‫رﻓﻊ‬ ‫ﻣﻦ‬ ‫ﺗﺄﻛﺪ‬‫اﻻﻧﺘﮭﺎء‬‫اﺳﺘﺨﺪام‬ ‫ﻣﻦ‬‫اﻹﻧﺘﺮﻧﺖ‬. ١٠-‫ﺟﮭﺎزك‬ ‫ﻓﻲ‬ ‫اﻟﺼﻠﺐ‬ ‫اﻟﻘﺮص‬ ‫ﻋﻠﻰ‬ ‫وﺗﺤﻤﯿﻠﮫ‬ ‫ﻣﻠﻒ‬ ‫أي‬ ‫ﺑﺈﺳﺘﻼم‬ ‫ﺗﻘﻢ‬ ‫ﻻ‬‫ﻣﺼﺪره‬ ‫ﻣﻦ‬ ‫ﻣﺘﺄﻛﺪا‬ ‫ﺗﻜﻦ‬ ‫ﻟﻢ‬ ‫إن‬ ‫اﻟﺸﺨﺼﻲ‬.

١٢ ‫ﻋﻨﻬﺎ‬ ‫ﻳﺒﺤﺚ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻷﺷﻴﺎء‬ ‫ﺃﻫﻢ‬ ‫ﻫﻲ‬ ‫ﻣﺎ‬‫؟‬ ‫ﺍﳍﺎﻛﺮﺯ‬ +‫وﺗﺤﺪي‬ ‫اﻹﻣﻜﺎﻧﯿﺎت‬ ‫ﻹﻇﮭﺎر‬ ‫وﻓﺮﺻﺔ‬ ‫ﻛﮭﻮاﯾﺔ‬ ‫اﻟﺘﺠﺴﺲ‬ ‫ﯾﻤﺎرﺳﻮن‬ ‫اﻟﮭﺎﻛﺮز‬ ‫ﺑﻌﺾ‬‫اﻟﻌﻤﻞ‬ ‫ھﺬا‬ ‫ﯾﻤﺎرس‬ ‫اﻵﺧﺮ‬ ‫واﻟﺒﻌﺾ‬ ‫اﻟﺬات‬ ‫ﻵﺧﺮ‬ ‫ھﺎﻛﺮ‬ ‫ﻣﻦ‬ ‫ﺗﺨﺘﻠﻒ‬ ‫أھﺪاف‬ ‫ﻋﺪة‬ ‫ﺗﺤﻘﯿﻖ‬ ‫ﺑﺪاﻓﻊ‬‫ﯾﻠﻲ‬ ‫ﻣﺎ‬ ‫ﻣﻨﮭﺎ‬ ‫وﻧﺬﻛﺮ‬: +‫اﻟﺒﻨﻜﯿ‬ ‫اﻟﻤﻌﻠﻮﻣﺎت‬ ‫ﺳﺮﻗﺔ‬ ‫ﺧﻼل‬ ‫ﻣﻦ‬ ‫اﻟﻤﺎل‬ ‫ﻋﻠﻰ‬ ‫اﻟﺤﺼﻮل‬‫ﻣﺜﻞ‬ ‫ﺔ‬‫اﻻﺋﺘﻤﺎﻧﯿﺔ‬ ‫اﻟﺒﻄﺎﻗﺎت‬ ‫أو‬ ‫اﻟﺤﺴﺎﺑﺎت‬ ‫أرﻗﺎم‬. +‫ﺷﺨﺼﯿﺔ‬ ‫ﺻﻮر‬ ‫أو‬ ‫ﻣﻌﻠﻮﻣﺎت‬ ‫ﻋﻠﻰ‬ ‫اﻟﺤﺼﻮل‬‫ﺑﻨﺸﺮ‬ ‫اﻟﻔﺘﯿﺎت‬ ‫ﺑﻌﺾ‬ ‫ﻛﺘﮭﺪﯾﺪ‬ ‫اﻧﺤﺮاﻓﯿﺔ‬ ‫أو‬ ‫ﻣﺎﻟﯿﺔ‬ ‫ﻷﻏﺮاض‬ ‫اﻻﺑﺘﺰاز‬ ‫ﺑﺪاﻓﻊ‬ ‫ﻋﻠﻰ‬ ‫ﺻﻮرھﻦ‬‫ﻣﺎﻟﯿﺔ‬ ‫أو‬ ‫اﻧﺤﺮاﻓﯿﺔ‬ ‫ﻟﻤﻄﺎﻟﺐ‬ ‫ﯾﺴﺘﺠﺒﻦ‬ ‫ﻟﻢ‬ ‫إذا‬ ‫اﻹﻧﺘﺮﻧﺖ‬!! +‫ﻣﻠﻔﺎت‬ ‫ﻋﻠﻰ‬ ‫اﻟﺤﺼﻮل‬‫أو‬ ‫اﻷرﻛﺎﻣﻜﺲ‬ ‫ﻣﻠﻔﺎت‬ ‫ﻣﺜﻞ‬ ‫ﺟﻤﯿﻠﺔ‬‫أو‬ ‫اﻟﺼﻮر‬ ‫أو‬ ‫اﻷﺻﻮات‬ ‫أو‬ ‫ﺑﻮﯾﻨﺖ‬ ‫اﻟﺒﺎور‬... +‫دﺧﻮل‬ ‫ﺣﺎل‬ ‫ﻓﻲ‬ ‫ﻧﺼﺮ‬ ‫ﺑﺘﺤﻘﯿﻖ‬ ‫ﻟﻼﻓﺘﺨﺎر‬ ‫وﻓﺮﺻﺔ‬ ‫اﻟﻌﻘﺒﺎت‬ ‫وﻣﻮاﺟﮭﺔ‬ ‫اﻻﺧﺘﺮاق‬ ‫ﻋﻠﻰ‬ ‫اﻟﻘﺪرة‬ ‫إﺛﺒﺎت‬‫اﻷﺟﮭﺰة‬ ‫أﺣﺪ‬ ‫ﻋﻠﻰ‬ ‫اﻟﮭﺎﻛﺮ‬ ‫اﻷﻧﻈﻤﺔ‬ ‫أو‬‫اﻟﻤﻌﻠﻮﻣﺎﺗﯿﺔ‬.. +‫اﻟﺮﻣﻮز‬ ‫ﻋﻠﻰ‬ ‫اﻟﺤﺼﻮل‬‫أ‬ ‫اﻟﺨﺎﺻﺔ‬ ‫اﻟﺮﺳﺎﺋﻞ‬ ‫ﻋﻠﻰ‬ ‫اﻟﺘﺠﺴﺲ‬ ‫ﻟﮫ‬ ‫ﻟﯿﺘﺴﻨﻰ‬ ‫اﻹﻟﻜﺘﺮوﻧﻲ‬ ‫ﻟﻠﺒﺮﯾﺪ‬ ‫اﻟﺴﺮﯾﺔ‬‫ﺳﺮﻗﺔ‬ ‫و‬‫اﺳﻢ‬‫اﻟﺒﺮﯾﺪ‬ ‫اﻹﻟﻜﺘﺮوﻧﻲ‬‫ﺑﺄﻛﻤﻠﮫ‬!! +‫ﺗﺪﻣﯿﺮه‬ ‫ﺑﮭﺪف‬ ‫اﻟﻤﻮاﻗﻊ‬ ‫ﻷﺣﺪ‬ ‫اﻟﺴﺮي‬ ‫اﻟﺮﻣﺰ‬ ‫ﻋﻠﻰ‬ ‫اﻟﺤﺼﻮل‬‫ﻣﺤﺘﻮﯾﺎﺗﮫ‬ ‫ﻓﻲ‬ ‫اﻟﺘﻐﯿﯿﺮ‬ ‫أو‬.. +‫ﺑﮭﺪف‬ ‫ﺟﮭﺎزه‬ ‫وﺗﺪﻣﯿﺮ‬ ‫اﻷﺷﺨﺎص‬ ‫أﺣﺪ‬ ‫ﻣﻦ‬ ‫اﻻﻧﺘﻘﺎم‬‫إذﻻﻟﮫ‬ ‫أو‬ ‫ﻗﮭﺮه‬.. ‫ﺗﻌﺮﻳﻒ‬‫ﺍﳍﻜﺮ‬: ‫ﻋﻠﻰ‬ ‫اﻟﻘﺎدر‬ ‫اﻟﻤﺒﺮﻣﺞ‬ ‫ھﻮ‬‫إﻧﺸﺎء‬‫ﺑﻌ‬ ‫و‬ ‫ﻣﻤﻜﻦ‬ ‫زﻣﻦ‬ ‫ﺑﺄﻗﻞ‬ ‫ﺑﺮﻧﺎﻣﺞ‬‫ﺪد‬‫أﻏﻼط‬Bugs‫ﺟﺪا‬ ‫ﻗﻠﯿﻞ‬‫أو‬‫ﻣﻌﺪوم‬.‫و‬ ‫واﺳﻌﺔ‬ ‫ﺧﺒﺮة‬ ‫ذو‬ ‫ھﻮ‬ ‫و‬ ‫اﻻﺗﺼﺎﻻت‬ ‫و‬ ‫اﻟﺒﺮﻣﺠﺔ‬ ‫ﻓﻲ‬ ‫ﺷﺎﻣﻠﺔ‬‫و‬‫اﻷﻧﻈﻤﺔ‬‫ﻛﺎﻓﺔ‬‫ﻓﻲ‬ ‫ھﻮ‬ ‫و‬‫اﻷﺳﺎس‬‫اﻟﺮﻗﻤﯿﺔ‬ ‫اﻟﻤﻌﻠﻮﻣﺎت‬ ‫اﻣﻦ‬ ‫رﺟﻞ‬‫أو‬‫ﯾﺴﻤﻰ‬ ‫ﻣﺎ‬Security AdministratorManger‫اﻻﺧﺘﺮاق‬ ‫ﻣﻦ‬ ‫اﻟﮭﺎﻛﺮ‬ ‫ﯾﺘﻤﻜﻦ‬ ‫ﻟﺬﻟﻚ‬‫اﻟﻜﺎﻣﻠﺔ‬ ‫و‬ ‫اﻟﺸﺎﻣﻠﺔ‬ ‫ﺑﺨﺒﺮﺗﮫ‬ ‫ﻣﺴﺘﻌﯿﻨﺎ‬.

١٣ ‫ﻫﺪﻑ‬‫ﺍﳍﻜﺮ‬: ‫اﻟﮭﺪف‬‫اﻷﺳﺎﺳﻲ‬‫اﻟﻤﻌﻠﻮﻣﺎت‬ ‫ﺣﺮﯾﺔ‬ ‫ھﻮ‬Freedom Of Information‫أي‬‫اﻧﮫ‬‫ﺿﺪ‬‫ﯾﺴﻤﻰ‬ ‫ﻣﺎ‬‫ﺑﺎﻻﺣﺘﻜﺎر‬‫اﻟﻤﺼﻨﻊ‬ ‫ھﻮ‬ ‫اﻟﻤﺠﺎﻧﯿﺔ‬ ‫ﻟﻠﺒﺮاﻣﺞ‬‫اﻟﺘﻲ‬‫ﺗﺴﺎﻋﺪ‬‫ﺑﻤﮭﺎم‬ ‫اﻟﻘﯿﺎم‬ ‫ﻋﻠﻰ‬ ‫اﻟﻤﺴﺘﺨﺪﻣﯿﻦ‬‫ﻣﻌﯿﻨﺔ‬‫ﻻ‬ ‫ﻗﺪ‬ ‫ﻣﻜﻠﻔﺔ‬

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

Book Of Hacking

book of hacking are a great way to gain specifics of operating certain products. ... Alif Baa Answer Key Introduction to Arabic Letters
Read more

Hacking the Arab Spring - Los Angeles Review of Books

BECAUSE I WILL probably forget to mention it later on: Alif the Unseen is a rattling good yarn, full of action and adventure, revolution and romance. It is ...
Read more

001 introduction (advanced ethical hacking in arabic ...

this video is the first unit form the book one of advanced ethical hacking (the first video only is theoretical and not contain any tutorial ...
Read more

Benny's Top Resources for Learning Arabic - Fluent in 3 ...

Benny’s Top Resources for Learning Arabic. ... Learn to Read Arabic – an excellent book by ... Pulling Back the “Magic” Curtain of Language Hacking;
Read more

Fluent in 3 months Premium 2.0 • Fluent in 3 months plus

I shared the essentials of my language learning systems in my bestselling book Fluent in 3 Months. ... Know About Language Hacking. ... Arabic. Chinese.
Read more

BASIC HACK AND TECH FOR BEGINNERS: FREE HACKING RELATED EBOOKS

THIS BLOG IS DEDICATED TO ALL THE BEGINNERS IN HACKING AND COMPUTER ... FREE HACKING RELATED EBOOKS. NOTE:- If any ... This book will take you from ...
Read more

Hacking Secret Ciphers with Python

“Hacking Secret Ciphers with Python” is licensed under a Creative ... Unfortunately the type of hacking you learn in this book isn’t dangerous enough to
Read more

hack Meaning in the Cambridge English Dictionary

Meaning of “hack” in the English Dictionary. British; ... hack into sth Two employees were charged with hacking into the company's ... books, etc. that ...
Read more

Arabic for Dummies - Arabic, Public School, California

Arabic for Dummies. Nada Shaath Bell High School Bell, California 2007- 2008. ... Newspapers, encyclopedias, and books were published. Classical Arabic, ...
Read more