Wired, but insecure: The hack attack
============================
Every computer has an IP (Internet Protocol) address. A DSL or cable
modem connection keeps the IP address âalways onâ . A dial-up
accountâs IP address is turned off by the service provider after a
certain amount of inactivity. Dial-up accounts get a different IP
address each time they are on Common methods for finding your IP
address are through chatrooms, looking up domain names on a domain
name registrar site, or running programs that can create a log of all
valid IP addresses.
In a chatroom, all a hacker has to do is right click on your chat ID
and get your IP address. A domain registrar can yield a websiteâs
employeesâ names, phone numbers, fax numbers, physical addresses and
IP addresses In âsocial engineeringâ , a hacker verbally chats you up
and gets your IP address and other important information.
The hacking
=========
With your IP address, a hacker can send programs to your PC to test
your system for vulnerabilities. He can find bugs, or holes in
software File- and print-sharing options allow him to access your hard
drive, load any program on the drive and delete/change any file on
your PC He may use âtrojansâ , which pretend to do useful tasks â" like
playing a video or greeting â" but actually help him access info on
your comp and/or even take it over Programs that allow the hacker
âbackdoorâ entry to your comp are commonly available.
They are used daily and legitimately by systems administrators for
remote systems Hackers change the names of their programs to make them
look like legitimate system programs. Or they create a hidden folder
on your comp to keep programs. The most common way that viruses are
spread is through e-mail . Usually, the virus is not in the e-mail
itself, but an attachment.
Cracking passwords
========= ======
Hackers use programs to crack passwords . Even a password-protected
computer can be broken into and other passwords then cracked.
A cracker dictionary has common computer terms and phrases, names,
slang and jargon, easily typed key sequences (like âqwertyâ ), and
phrases you might commonly use as a password.
Programs to crack passwords are handed out with copies of these
dictionaries.
A common method for cracking passwords is to get a copy of a systemâs
password file. It lists all encrypted passwords on the system.
Security breached
==============
A hacker can steal and delete files, load dangerous programs on your
PC, involve you in computer crime. He can get your home, office or
bank passwords.
A hacker can see your screen as you see it, watch every move of your
mouse, see every word you type Proxy problems.
Often, the hacker is not interested in the hacked system. He just
wants to hack into larger systems or send e-mails A hacker can load a
program onto hundreds of hacked PCs and then direct the PCs to bomb a
particular firmâs server with junk mail or problem messages.
Securing your computer
==================
Basic security
Turn off your comp when not using it Use a firewall and anti-virus
Turn off file and print sharing Be up-to-date . Hackers count on the
publicâs ignorance.
Specific measures
Donât visit chat rooms unless they are closed and you know the
administrator Almost never open an attachment that ends in .DLL
or .EXE, even if the email is from your best friend. The only time you
can open such attachments is if you know whatâs in them To outwit
script-based viruses , ask an expert how you can open scripts in
Notepad (or Wordpad). Then get someone who knows Visual Basic to look
at it If youâre not on your PC, but see its modem lights flash, a
hacker could be t esting for vulnerabilities.
Password protection
A good password is easily remembered , but not easily guessable. It
should be kept a secret, never written down, never saved in a file
When a website asks if a password should be saved, say no A password
must have at least six or more letters, numbers or punctuations. The
letters should be capitals and lowercase . It should not have four or
more letters found consecutively in the dictionary . Reversing the
letters wonât help.
Legal means
The government could make it mandatory for PC and laptop owners and
ISPs to use security measures.
--
Sources
No comments:
Post a Comment