User:Infinitycr4k3r

Infinity  is a Grey-Hat Hacker. He first gained popularity in the year 2013 after he created his Blog based on hacking and Security. He was born in India (no exact location specified).He started using computer at the very early age of 5. Due to his extraordinary skills, he was awarded with many trophies during his school time. Along With Interest and passion in cyber field, he has interest in music. He is a guitarist as well and had played some very tough guitar solos of some famous guitarists.

Early Life
Infinity started using gadgets at the age of 5. He later started exploring more and more about how various things work. He always had an advantage of his curiosity which later resulted in his vast knowledge of things related to machines (whether software or hardware). At the age of 14, he was awarded for the first time for the best computer expert in his school which was pretty much obvious because when his classmates were learning html, he was able to create large websites very easily.

Passion in Music
He was very interested in music and is a great guitarist but when he first started playing guitars, his cyber skills suffered and it was not easy for him to catch both skills at the same time. Later, he started devoting equal time to both and now is a very good

DDoS
In computing, a distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. A DoS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Infinity started using various web servers as botnets to DDoS various sites. He never revealed the technique to DDoS sites but he surely provided help to other hackers using DDoS for good cause.

Kali Linux
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous forensics Linux distribution.Kali Linux is preinstalled with over 600 penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP (both web application security scanners). Kali Linux can run natively when installed on a computer's hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits. Infinity is an expert of Kali Linux and is well known to know about every preinstalled hacking tool integrated in it. He used Kali Linux in many of his hacks.

Anonymous Hacktivist
Anonymous (used as a mass noun) is a loosely associated international network of activist and hacktivist entities. A website nominally associated with the group describes it as "an internet gathering" with "a very loose and decentralized command structure that operates on ideas rather than directives". The group became known for a series of well-publicized publicity stunts and distributed denial-of-service (DDoS) attacks on government, religious, and corporate websites. Infinity is one of the most famous Hacktivist among other Hacktivists. He was known by the name Infinity(codename). He actively participated in various hacking projects to help people around the world to get the freedom they deserve.

Public Image
Not many people are aware of him as he never revealed much about him in front of public. He earned his fame through his blog which contained almost unlimited knowledge about hacking and all for free. He is very much fond of testing new devices and is an android developer as well. Due to his software skills, he is very much famous among people near him. He is a web designer as well and had create various large scale websites for himself and others.

Personal Life
His personal life was always a secret and he stated that it will always be a secret until an unless he himself wants people to know it. By the nature he is very friendly and is liked by everyone around him. When it comes to privacy, he always stated his contact details on social networks. He always uses multiple channel virtual layers of TOR connections to hide his real location.

His Words

 * 1) I'm a hacker, but I'm the good kind of hackers. And I've never been a criminal.
 * 2) Younger hackers are hard to classify. They're probably just as diverse as the old hackers are. We're all over the map.
 * 3) Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause.
 * 4) Well, take the evolution of the Electronic Frontier Foundation. It began as hackers' rights. Then it became general civil liberties of everybody - government stay away.
 * 5) In The end, have nothing in cyber world. Just a fake name.

In The End
Never memorize what you can look up in books. Multitasking is the art of distracting yourself from two things you’d rather not be doing by doing them simultaneously. To err is human, but to really foul things up you need a computer. Think of all the psychic energy expended in seeking a fundamental distinction between "algorithm" and "program". Hacking is not bad until you are using it to improve something. I never used my skills to harm others but when it comes to destruction, we hackers have power to destroy the whole world sitting behind the scene.So beware and be aware of us.