Tuesday, October 25

The Basics of Protecting against Computer Hacking


The Hacker and Cracker
 

Technically, a "hacker" is someone who is enthusiastic about computer programming and all things computer related, and is motivated by curiosity to reverse engineer software and to explore.



The term "cracker", on the other hand, describes those who apply hacking skills to gain unauthorized access to a computer facility, often with sinister motives. But "cracking" never really caught on, perhaps due to the grey area that exists between the two activities and to the media's widespread use of "hacking" as a term synonymous with computer crime. I will not therefore try to buck the trend in this article.

You can even refer my thread on “Hacking Terminologies” here, View.
 
If you are new to hacking, then you should refer my “Beginner’s Guide to Hacking”. Visit: Beginner’s Guide



Computer hacking

Hacking is in some ways the online equivalent to burglary; in other words breaking into premises against the wishes of the lawful owner - in some jurisdictions a crime in itself – from which other criminal acts such as theft and/or damage generally result. Computer hacking refers to gaining unauthorized access to, and hence some measure of control over, a computer facility, and most countries now have specific legislation in place to deter those who might wish to practice this art and science. In some jurisdictions, unauthorized access alone constitutes a criminal offence, even if the hacker attempts nothing further. However, in practice, hackers generally have a particular target in mind, so their unauthorized access leads to further acts, which national law might also define as criminal activities. There are different method to perform computer hacking using telnet, NetBIOS and many more. But the main thing is to knowing the IP Address of your target. If you don’t know how to trace an Ip Address, refer my post here, View post.

The Ten Immutable Laws of Security

1. If a bad guy can persuade you to run his program on your computer; it's not your computer anymore.

2 If a bad guy can alter the operating system on your computer, it's not your computer anymore.

3. If a bad guy has unrestricted physical access to your computer; it's not your computer anymore.

4. If you allow a bad guy to upload programs to your web site, it's not your web site any more.

5. Weak passwords trump strong security.

6. A machine is only as secure as the administrator is trustworthy.

7. Encrypted data is only as secure as the decryption key.

8. An out of date virus scanner is only marginally better than no virus scanner at all.

9. Absolute anonymity isn't practical, in real life or on the web.

10. Technology is not a panacea.

Here, my post on Protecting from Computer Hacking ends up. Hope you liked and if you didn’t understood any point in my post. Please pass it in the comments. I will be glad to answer you all.

Thanks

No comments:

Post a Comment

Enter your Comment...