How hackers operate?

People who try to breach computer security should be called crackers ideally, rather than hackers.So, hackers, as popularly defined, are computer experts who spend enormous amounts of time trying to breach the security of networks, Web servers and email servers. Normally hackers use a selection of specialist software to identify the weaknesses, which are then exploited.

The majority of them do it for fun and also as a challenge. They aim at the big companies and authorities and are not interested in attacking private individuals. .

There are two aspects of hacking that you have to worry about as a private individual. The first aspect is that your details are on various company databases, and when these are cracked, information about you can be stolen.

The second problem is that serious hackers need to protect their anonymity. This means they can’t mount their attacks on organisations like the FBI directly through their own computers and telephone lines. They require an intermediary.

To get an intermediate base the hackers use programs called trojans and backdoors. A trojan is a program that looks innocent but carries a dangerous payload, like the Trojan Horse of Greek mythology. This program may be disguised as a game or other kind of executable program, similar to the viruses that are often disguised.

The payload carries a backdoor program (maybe just a few lines of code that creates a security hole to install a backdoor program later). A backdoor program allows the hacker to access your computer whenever it’s on the Internet. It’s a remote control, and usually a very thorough one with full access to every facility and file on your computer.

It’s absolutely important to avoid getting a backdoor program inside your computer. The best way is to use a competent virus protection program. Most of these will stop trojans and backdoors getting through.

Once the programs are inside, it will send a message back to the hacker to say it’s colonized your computer. It may also send a message each time you log on to the Internet, because it’s likely you’ll be given a different IP address by your ISP each time you log on.

If your machine behaves strangely and you think you’ve got a parasitic backdoor (it’s a bit like somebody else having a remote keyboard for the same computer) manually unplug the phone line to break the connection and ensure that you get a top virus protection program. Don’t reconnect that machine to the Internet in any accord until it’s clean.

The exception is if you run a permanent Internet connection, especially a broadband cable connection or DSL, hackers just love to colonise these connections as they’re so useful. You must install extra security if you possess any of these connections. Your service provider will be aware of these risks and would offer you advice on the kind of security required. A good start is to install a firewall. Personal firewalls from reliable sources may be installed.

Nine important safety tips:

  1. Don’t open email attachments unless you are expecting them.
  2. Check for the closed padlock or key symbol in the browser window when you enter the credit card details and other personal information on a Web site.
  3. Download software from sites that you trust.
  4. Assume that all your emails are read by other people.
  5. Use anti-virus software and keep the virus recognition data file updated on a regular basis.
  6. Use the latest version of your operating system and web browsers.
  7. Use good passwords – Preferably alpha numeric and ensure that they are changed periodically without repetition.
  8. Don’t store important passwords on your machine or in a password saver.
  9. Install a firewall. It is very vital & essential.

Comments are closed.