* Among geeks, the word hacker has many definitions, including a good programmer, a bad programmer, or a person that modifies technology hardware. In the mass media, it’s a person that accesses a computer they don’t own without permission.
* A cracker is what computer break-in artists called themselves, but we call them hackers.
* Crackers’ motivations are varied. They hack to steal, to protest, to make money, to terrorize to prove a point, or—as George Mallory said about Mount Everest and a very nice donut earlier that day—”because it’s there.”
* Personal computers are usually hacked so they can be turned into zombies and be remote controlled to attack other computers, used as a storage for illicit information, or used to send spam. Sometimes they are hacked by identity thieves who steal personal financial information.
* Windows XP has a built-in firewall. When installed, Service Pack 2 turns it on for you.
* A third-party firewall is a program that acts as an electronic wall on a computer to stop inbound traffic and, usually, outbound communication that contain viruses, spyware, and other malicious programs.
* A hardware firewall is a device that blocks inbound traffic from the Internet. Network address translation technology in a home router provides a firewall function.
* It’s hard to tell if you have been hacked. The only way to have complete peace of mind after you have been hacked is to wipe your computer clean and start fresh.
* You should ensure you have at least one firewall—either hardware or software—turned on, protecting your computer from viruses and worms.
The Absolute Minimum
February 28, 2007
0 Comments
Explore More
Nmap 5.50 latest Version out !
“Nmap (“Network Mapperâ€) is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network
Critical Blind SQL injection in ChartNexus.com
PlanetCreator has reported another critical Blind SQL Injection (vulnerability) on http://www.starinvestorrelations.com/ which owned by FiNEX Solutions Pte. Ltd. (“FiNEX Solutions”) powered by http://www.chartnexus.com/ This vulnerability has been alerted to :-
Targets of a Hack Attack
Hacker interests lie in many types of computers on the Internet. Following is a discussion of the types of targets and their appeal to the perpetrators.Corporate Networks Corporate computers are
