Google

Blog Archive

Tuesday, August 26, 2008

Your IP address now to be traced !

 

Wired, but insecure: The hack attack
============================

Every computer has an IP (Internet Protocol) address. A DSL or cable
modem connection keeps the IP address ‘always on’ . A dial-up
account’s IP address is turned off by the service provider after a
certain amount of inactivity. Dial-up accounts get a different IP
address each time they are on Common methods for finding your IP
address are through chatrooms, looking up domain names on a domain
name registrar site, or running programs that can create a log of all
valid IP addresses.

In a chatroom, all a hacker has to do is right click on your chat ID
and get your IP address. A domain registrar can yield a website’s
employees’ names, phone numbers, fax numbers, physical addresses and
IP addresses In ‘social engineering’ , a hacker verbally chats you up
and gets your IP address and other important information.

The hacking
=========

With your IP address, a hacker can send programs to your PC to test
your system for vulnerabilities. He can find bugs, or holes in
software File- and print-sharing options allow him to access your hard
drive, load any program on the drive and delete/change any file on
your PC He may use ‘trojans’ , which pretend to do useful tasks â€" like
playing a video or greeting â€" but actually help him access info on
your comp and/or even take it over Programs that allow the hacker
‘backdoor’ entry to your comp are commonly available.

They are used daily and legitimately by systems administrators for
remote systems Hackers change the names of their programs to make them
look like legitimate system programs. Or they create a hidden folder
on your comp to keep programs. The most common way that viruses are
spread is through e-mail . Usually, the virus is not in the e-mail
itself, but an attachment.

Cracking passwords
========= ======
Hackers use programs to crack passwords . Even a password-protected
computer can be broken into and other passwords then cracked.

A cracker dictionary has common computer terms and phrases, names,
slang and jargon, easily typed key sequences (like ‘qwerty’ ), and
phrases you might commonly use as a password.

Programs to crack passwords are handed out with copies of these
dictionaries.

A common method for cracking passwords is to get a copy of a system’s
password file. It lists all encrypted passwords on the system.

Security breached
==============

A hacker can steal and delete files, load dangerous programs on your
PC, involve you in computer crime. He can get your home, office or
bank passwords.

A hacker can see your screen as you see it, watch every move of your
mouse, see every word you type Proxy problems.

Often, the hacker is not interested in the hacked system. He just
wants to hack into larger systems or send e-mails A hacker can load a
program onto hundreds of hacked PCs and then direct the PCs to bomb a
particular firm’s server with junk mail or problem messages.

Securing your computer
==================

Basic security

Turn off your comp when not using it Use a firewall and anti-virus
Turn off file and print sharing Be up-to-date . Hackers count on the
public’s ignorance.

Specific measures

Don’t visit chat rooms unless they are closed and you know the
administrator Almost never open an attachment that ends in .DLL
or .EXE, even if the email is from your best friend. The only time you
can open such attachments is if you know what’s in them To outwit
script-based viruses , ask an expert how you can open scripts in
Notepad (or Wordpad). Then get someone who knows Visual Basic to look
at it If you’re not on your PC, but see its modem lights flash, a
hacker could be t esting for vulnerabilities.

Password protection

A good password is easily remembered , but not easily guessable. It
should be kept a secret, never written down, never saved in a file
When a website asks if a password should be saved, say no A password
must have at least six or more letters, numbers or punctuations. The
letters should be capitals and lowercase . It should not have four or
more letters found consecutively in the dictionary . Reversing the
letters won’t help.

Legal means

The government could make it mandatory for PC and laptop owners and
ISPs to use security measures.

--
Sources

No comments:

Sify.com - News

NDTV - Business News

Moneycontrol - Buzzing Stocks

Moneycontrol Top Headlines

News Flash from IndiaEarnings

Saraswat Bk seeks RBI nod to acquire ailing South Ind Co Bk
Telekom Malaysia to pick up addl 15% stake in Idea: Srcs
Hind Rectifiers brd meet on June 24 to consider bonus issue
Inflation will touch double digit mark next week: I-Sec
NY Times in talks to buy 5% stake in Deccan Chron Arm
Inflation for wk ended Apr5 revised to 7.71% vs 7.14%earlier
Inflation for week ended May 31 at 8.75% vs 8.24%
Indian economy won't be as badly hit as the global eco:DCB
Over a period of time mkt may drift down to 4060 :Atul Suri
Shriram Cap likely seller in Shriram City Un Fin block deal
Shriram City Union Fin changes 12.2% Eq via block deal
No big rally in mkt till oil pices cool off: Lehman Bros
BoJ keeps key interest rate unchanged at 0.5%
J&K Bank raises Prime Lending Rates by 100 bps to 14%
L&T aays plan to list IT sdubsidiary in FY09
IFCI okays initiation of legal process to align LIC stk
Rupee opens at 42.82/USD vs 42.84/USD on Thursday
Karnataka Bank board approves 1:5 rights issue at Rs 100/sh
45.37 lakh Suzlon shr change hands on BSE at Rs 250.95/sh
Oil India plans to launch IPO by Sep: NW18
ABG Shipyard bags order worth Rs 127 Cr
Nutrient base pricing is good for industry:RCF
FM says avg prc of complex fert to decline by Rs 1416/t
Deccan Chronicle likely to place Sieger Eq at EV of USD750 m
BNP Paribas see 25 bps CRR hike before RBI July policy
Disclaimer