In a chatroom, all a hacker has to do is right click on a chat ID and get the IP address. A domain registrar can yield a website’s employees’ names, phone numbers, fax numbers, physical addresses and IP addresses. In ‘social engineering’ a hacker verbally chats up the user and gets his IP address and other important information. Here’s looking into how a hacker can break into a PC and misuse it.
How it works
The hacker may use ‘Trojans’, which pretend to do useful tasks--like playing a video or greeting--but actually help him access info from the computer and/or even take it over. Programmes that allow the hacker ‘backdoor’ entry to a computer are commonly available.
These programmes are used daily and legitimately by many systems administrators for remote systems. Hackers change the names of their programmes to make them look like legitimate system programmes.
Or they create a hidden folder on the user’s computer to keep programmes. The most common way that viruses are spread is through e-mails. Usually, the virus is not in the e-mail itself, but as an attachment.
Cracking passwords
A password cracker dictionary has common computer terms and phrases, names, slang and jargon, easily typed key sequences (like ‘qwerty’), and phrases one might commonly use as a password.
Programmes to crack passwords are handed out with copies of these dictionaries. A common method for cracking passwords is to get a copy of a system’s password file. It lists all encrypted passwords on the system.
Security breach
A hacker can even see the screen as the user sees it, watch every move of his mouse and see every word he types.
Often, the hacker is not interested in the hacked system. He just wants to hack into larger systems or send e-mails. A hacker can load a programme onto hundreds of hacked PCs and then direct the PCs to bomb a particular firm’s server with junk mail or problem messages.
Specific measures
In order outwit script-based viruses; it is adviceable to ask an expert how one can open scripts in Notepad or Wordpad. Then he should get someone who knows Visual Basic to look at it. If the user is not on his PC, but sees its modem lights flash, it means a hacker could be testing for vulnerabilities.
Password protection
The letters should be in capitals and lowercase. It should not have four or more letters found consecutively in the dictionary. Here reversing the letters won’t help.
3 comments:
i learned a lot from this. :)
i learned a lot
your welcome! happy to be of any help!
Post a Comment