Hacking Basics, Types And Complete Information

  • Uploaded by: Sanjay Dudani
  • 0
  • 0
  • July 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Hacking Basics, Types And Complete Information as PDF for free.

More details

  • Words: 24,975
  • Pages: 79
2009 Articles from Hackingalert.com

Collected and Designed By Sanjay Dudani www.Scribd.com/SanjayDudani 1

This page intentionally left blank.

2

Contents at a Glance Article No.

Article Name

Page No.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

Computer hacking Basics of Hacking Hacking Tutorial History of Hacking Hackers and Crackers Catching a Hacker Hacker Software Website Hacking Mobile Phone Hacking Email Hacking Credit Card Hacking Password Hacking Hacking Google Linux Hacking Google Hacking and Prevention Hacking Tools Network Hacking Tools Ethical Hacker Hacking Laws Intrusion Detection System White Hat Hacking Yahoo Hacking Programs Game Hacking Hacking culture Black Hat Hackers Computer Hacking Prevention

5 9 12 15 18 21 24 27 30 33 36 39 42 45 48 50 53 56 58 62 64 66 68 71 74 77

3

4

Article 1

Computer hacking Black hat or White hat! Computer Hacking Explained A Brief History One might not suspect that the art, or scourge, of computer hacking was created at one of the havens for technological excellence. True, at MIT (Massachusetts Institute of Technology), a group of students developed the technique and borrowed their name from the "hackers" of the late 1800s who found amusement in pranking the emerging telephone companies.Getting their laughs and skills from hacking and cracking into primitive computers and exploiting the Arpanet (predecessor to the internet), they created a novelty that would become the target of federal crackdown in years to come. To define hacking in short, we can say that an artistic criminal offense of breaking into another remote system without the owner's consent for the purpose of stealing information is what is hacking. However, the act of hacking started out innocently, and was basically a method of trying to figure out how computer systems worked. The 1970s saw the rise in "phreaking," or phone hacking, headed by John Draper. This method allowed the user of a "blue box,", when used with a Captain Crunch whistle of 2600 hertz which accessed the AT&T long distance system, to make free long distance calls. Hackers initiated with accessing the free phone calls through a varied range of sources, thereby managing to circumvent into the nation's radio system and the phoning system resulting in a tremendous phone fraud nationwide. After the age of "phreaking," computers became not only the target, but also the forum, for a growing hacker population to communicate. The creation of bulletin board systems (BBS) allowed this communication and the technological possibility of more serious government and credit card hacking became possible. At this time in the early 80's, hacking groups such as the Legion of Doom began to emerge in the United States, giving organization, and thus more power to hackers across the country. Once this happened, breaking into the computers became a legitimate activity, with its own groups and soon its own voice with the 2600 magazine, launched in 1984. The effects of computer hacking were serious. Two years later, inevitably, Congress launched the Computer Fraud and Abuse Act that outlawed hacking. Over the years, there was a series of noticeable 5

occurrences as the worst consequential effect of computer hacking on more high profile cases, such as the Morris Worm, responsible for infecting government and university systems, and the Mitnick case in 1995, which captured Kevin Mitnick, steeling as many as 20000 credit card numbers. In 1999, security software became widely known by the public, and with the release of new Windows programs, which were littered with security weaknesses, they became successful because of necessity. This fraudulent act of computer hacking is perhaps the major problem, confronting the rapidly expanding population of Internet users today, with the systems still trying to battle online hackers.

Computer Hacking and Cracking basics Nuts and Bolts To know what is computer hacking, one must know their terms. A list of certain significant ones is described below. Hacking run essentially, a hacking run is a hacking session that lasts longer than normal working times, i.e. a hacking run that lasts for in excess of eight to ten hours. White Hat considered one of nice guys, a white hat hacker is one who hacks and the informs the owner of the hacking Black Hat in contrast, the black hat hacker is considered a criminal and uses his/her skills to break the law Gray Hat as one would imagine, a gray hat hacker sometimes is good, and sometimes is criminal; a combination of the white and black hat Script Kiddie a demeaning term, used for those who hack but do so by following directions and not creating anything of their own Trojan horse deceptive programs that pretend they do one thing, only to enter the computer system and do another; however, they need not be bad for the computer Virus a self-replicating program that inserts itself into executable codes or documents

6

Worm also a self-replicating program, but a worm breeds itself in computer systems.

Software, Hardware, and Internet Hacking Although the computer languages should solely be used for the legitimate purposes such as learning and other constructive purposes, yet there are lots of ways these languages are used as the means of destructions. The languages such as C, C++, java, Pearl and few more like these are used for hacking. Hackers are the programming experts who have sound grips in the language mentioned above. The language C is the utmost flexible and is the widely accepted one as the ported language in the community of the hackers. Linux is the strongest hacker-friendly operating system that can be used by the hackers intending to hack another system. The hackers use wide range software to break into the remote systems. Although these programs and software were constructed for some legal purposes, yet they have turned to be the serious hacker tools. A few worth mentioning software and programs are DeCSS 1.2b, Coldlife 4.0, PCHelps Network Tracer, IntelliTamper 2.07 and etc. Software hacking is best achieved through the use of a virus that is delivered via Internet. When a virus is loaded on the computer its affects varies within a great range -- from a trivial damage that may be negligible to a great loss by altering or wiping off the entire content of the computer hard disk. However, a worm nests in the hardware and is activated simply by turning on the machine in the affected network. It has the potential to wreak havoc by crashing an entire system. Hardware hacking is a fresh new aspect that has been expanded on a new generation of tinkerers. The process of hard hacking by means of then application specific IC's ASIC is the mentionable issue. The world's business is suffering the menace of bots and the network worms. Furthermore, hackers can alter content on a website or steal information in encrypted pages by cracking the "code" which programs the site. The website hacking through network hacking system is another alternative. A bot network invasion can be launched to bring serious harm to the remote system. The websites are hacked to satisfy the hacker's hunger of information and other records. Those who engage in this are also hackers, but they specifically devote time to studying cryptography in computers and putting this into practice. However, this is not all done by the individual. A series of mathematical functions, performed and run through computers, are used to crack the encryption of a system that was usually made to be exceedingly difficult to figure out. All of the above can be done by employing a careful process of reverse engineering (RE), which is simply trying to uncover the functioning principles of an application by "deconstructing" the way it was initially put together. The effect of the computer hacking is going to be more and more horrendous with the emergence more and more advanced technology and tools.

7

Hacking and cracking has become mainstream language since its beginnings in the late 60s. Today, it stands as one of the foremost concerns in computer safety and as it continues, the measures to combat it are getting increasingly more sophisticated. In this battle, sites on the Internet abound for both hacking tutorials and ways to protect the computer. This battle against the computer hacking has to be waged as long as computers, and the valuable information they store, are part of our lives. As an art of exploitation, hacking and cracking networks is a menace to the world of computer at the moment.

8

Article 2

Basics of Hacking He can easily tweak these according to his needs and become hacker. This is the way the term was used when Bill Gates was inventing Windows. Those who are often referred to as hackers today, should actually be called "crackers" - people who do not have unauthorized access, like a safe-cracker. If you doubt me, and want to know how to be a hacker then do a search on the term "professional hacker," and you will find many professional and legitimate computer training courses being offered. They are the ones learning the real hacker secrets.

What Are The Basics Needed To Become A Hacker Everyone has heard of one individual or another that was caught while hacking computers that belonged to this or that organization. Because hacking into computers is highly illegal, it should be mentioned that this article will not mention any real specifics about the subject, and this author would rather gladly encourage you to become a real hacker - professionally. This article, will however, give a brief overview of criminal hackers, some of their methods, and a few things you can do to make your own computer safer from hack attacks. Here are those things you need to learn on how to become a hacker. •

Learn Computers It should go without saying that the first thing that is needed is to learn about computers. This means study. A lot of reading is involved along with just plain old-fashioned learning how to use a computer. Then, of course, there are the special aspects of computer study. The places where the tips are learned is often two-fold: a friend who has access to a computer, and a variety of places on the Web. But this is also an interesting thing - if a young person has the ability to learn, and wants to learn can use hacking tutorials- then why not take the time to learn the right things - things that can earn him a lot of money in the legit world? Is it possibly that it could be the friend he has that turns him away from the good?

Search for tools on Hackers Websites and forums •

Learn The Websites Special hacker Web sites, where hackers congregate, exist on the Web - as does every other known group of people - whether legal or illegal. Some of these are known to be hacker chat rooms, hacker forum, and regular hacker sites.

9



Learn The Secrets

It is in these Web sites, and possibly some of the people that he may meet, maybe only online, where he will learn the hacking basics, and learn how to hack.

Tools Hackers Need To Get Into Websites Some of the tools that a hacker may use are often varied and constantly changing. One such tool that was used last year allowed a hacker to gain control of the computers of those who simply mistyped the word Google - when trying to get the popular search engine. This automatically directed them to a special website that would give them such malware items as Trojan downloaders, backdoors and spyware. 2

Another tool would be the robot spider. These can be sent out and put on automatic and will look for ports of access into your computer. These spiders are running around all the time and some say that they may hit most computers that are online - up to 50 times a day. Other tools use email attachments. It is claimed that as much as 65% of all email is spam. And as much as 1 in about 30 emails contains a virus, or some form of malware. This is why having your own virus and spam protection is a must, as well as a good spyware remover. Someone is busy. Once someone has been hacking information on a computer they will often leave a Trojan file that will give them further access - often more than one file. Then they could use your computer to send out spam attacks without you even knowing that it is taking place. Or, they could simply be hacking your personal information off of your computer. These are just a few of their tools.

How Hackers Avoid Getting Caught One of the first things that someone would learn about hacking tutorials when studying to be a hacker is how to cover their tracks. Of course, some are better than others. A young hacker is less likely to know all the little things that an expert hacker might know. Besides, the young hacker may be trying to impress others - and get a little careless about covering his tracks. This is why younger hackers are often caught. An older hacker, on the other hand, will rarely leave any tracks. They know how to use their victim's computers as a tool for a launching place to get into another computer - leaving a phony IP address. The truth is, and it is a good thing, that computer programmers are getting better software, and hardware (firewalls) that are constantly doing a better job - both in keeping hackers out, and in recording IP addresses better for tracking purposes. There will always be hackers, and there will always be hackers in prison. The legislation is definitely 10

turning against the hacker - with some hacking crimes becoming equal to terrorism, these days. Kevin Mitnick, a well-known hacker, had the Federal prosecutors accuse him of having caused $291 million in damages to corporate computers. A serious crime, and he remains in jail because of it - unable to touch anymore computers. Even by learning some of the wrong type of hacking basics through hacking tutorials, a young person could start down a wrong path. Hacking computers, though often glorified on TV, is still criminal.

11

Article 3

Hacking Tutorial Hacking Simplified – For Those Who Want to Learn Things From the Scratch It's quite probable that you have received spam offering a hotmail hacking guide that will give you the basics on how to become a hacker. Although it sounds tempting to have the power to know the private life of other persons, most of these guides and courses are nothing but scams that are looking for new victims. If you really want to become a hacker, you need to go to the places were they gather: a hacking facebook, a hacker's forum, free hacking tutorials or even a mailing list. The information is out there. You only need to go and find it.

Hacking Simplified - For Those Who Want to Learn Things From the Scratch It's quite probable that you have received spam offering a hotmail hacking guide that will give you the basics on how to become a hacker. Although it sounds tempting to have the power to know the private life of other persons, most of these guides and courses are nothing but scams that are looking for new victims. If you really want to become a hacker, you need to go to the places were they gather: a hacking facebook, a hacker's forum, free hacking tutorials or even a mailing list. The information is out there. You only need to go and find it. Where Can You Get Material on Hacking and Information on Hacking There are two main sources. The first one is the Internet. You will have to make a basic query in your favorite search engine with the word hacker and start looking each one of the suggested sites. Most of them will only offer you limited tutorials on how to hack (like the Hacker's Black book or the Happy Hacker book, which are outdated). Other's will give you an useful insight on this world. After some time, you will find forums were people from around the world share their experiences. Do not expect to enter an easy world. The jargon used by a group of hackers can be quite confusing for any beginner. So don't feel that you will never be part of it. Start with the basics and read "How to become a hacker" from Eric S. Rymond. Although the document is five years old, it will give you an introductory crash course on were do you need to start. 12

The second source is face to face reunions. Get into the internet and search for any hacker's meeting in your vicinity. You will be surprised to find that they meet quite regularly. Of course, do not expect to find a Matrix kind of reunion. This is serious, professional people that pay their rent by hacking. Drop by and make some questions on hacking tutorials. What Is The Hackers Bible? The hacker's bible has two possible sources, depending on whom do you ask. For some people, it is none other but the magazine 2600: The Hacker Quarterly. This magazine was created by Emmanuel Goldstein, and it focuses on aspects of different technologies. For example, it covers telecommunication devices as well as computers. The magazine gives to its readers grey hacker's material. That means that it gives them information on how to augment the capacities of any electronic apparatus, such as a cell phone. This neutral posture is different to white hacking (were a hacker uses his abilities for a good cause, like detecting the vulnerabilities of a network) and black hacking (were a hacker uses his knowledge for selfish purposes, like creating a hotmail hacking guide). The other Hacker's Bible is the Jargon File. This document is a glossary of hacker slang that has been collected since 1975, from the old days of the Arpanet (the precursor of the Internet).

Are There Any Hacking Facebook Or Forums That Can Help You Identify The Latest Threats In Hacking? Fortunately, yes. You only need to input the words hack and forum in your favorite search engine and you will find lots of sites were the latest threats are discussed. But be careful. As it was stated in a previous paragraph, the hacker slang can be quite a hieroglyphic for a newbie.

If you find a forum or an IRC chat were hackers discuss their experiences and give recommendations, make sure that you understand them. If you don't, then you should take a step backward and return to the web pages where they give introductory advice to beginners. Can You Really Become A Hacker With The Material Or Will You Land In Jail? You can become a hacker with the material found inside the internet without spending your life in jail. As it was mentioned before, a hacker has three choices: white, grey and black hacking. As a white hacker you may be able to offer your services to different businesses as a freelancer; you will be able to show them any vulnerability in their systems.

13

As a grey hacker you stand in the thin line between good and evil. Although you will not end in jail for this type of activity, you could end in the "dark side" before you even notice it. In case you cross this boundary, then you will be considered a nuisance to society, and could finish with a restriction to use computers (besides a huge fine and a term in prison, of course). Hacking is not for everyone. You need the skills, the patience and the knowledge for mastering this art. If you feel that you have what it takes to become a hacker, then start with a hacking facebook. Read it completely. As a matter of fact, devour it. Hacking requires a lot of reading so better to get accustomed to it. So, forget about that hotmail hacking guide and start doing real hacker's stuff.

14

Article 4

History of Hacking Is Hacking Always Bad? Although the history of hacking is relatively unknown to most of the public, it's quite interesting to read about it. It doesn't matter if you aren't a computer expert or a system administrator of a big corporation. Computers are as much part of our history as airplanes and cars, and it should be common knowledge to know how they came to be. It's the only way you can understand the effects of computer hacking in our life. History of Hacking Hacking is not limited to computers. The real meaning of hacking is to expand the capabilities of any electronic device; to use them beyond the original intentions of the manufacturer. As a matter of fact, the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains. They wanted them to perform faster and more efficiently. So, is hacking always bad? Not really. It only depends on how to use it. But it wasn't until a group of these hackers decided to exert their knowledge in the computer mainframes of the MIT. During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. Within these group of people, a phreaker became famous because a simple discovery. John Draper, also known as Captain Crunch, found that he could make long distance calls with a whistle. He built a blue box that could do this and the Esquire magazine published an article on how to build them. Fascinated by this discovery, two kids, Steve Wozniak and Steve Jobs, decided to sell these blue boxes, starting a business friendship which resulted in the founding of Apple. By the 1980's, phreaks started to migrate to computers, and the first Bulletin Board Systems (BBS) appeared. BBS are like the yahoo groups of today, were people posted messages of any kind of topics. The BBS used by hackers specialized in tips on how to break into computers, how to use stolen credit card numbers and share stolen computer passwords. It wasn't until 1986 that the US government realized the danger that hackers represented to the national security. As a way to counteract this menace, the Congress passed the Computer Fraud and Abuse Act, making computer breaking a crime across the nation. 15

During the 1990's, when the use of the internet widespread around the world, hackers multiplied, but it wasn't until the end of the decade that system's security became mainstream among the public.

Profiles of Famous Computer Hackers As it was mentioned before, the history of hacking is intermixed with the history of computers. Many of the famous computer hackers of the past are the billionaires of today. The most known hacker is Bill Gates, co-founder of Microsoft. Considered the richest person in the world for more than a decade, he became the most successful entrepreneur of the computer industry. His beginnings go back to the 1970's when he designed computer programs for the computer platforms of that era, and ended with the introduction of Windows in the world of personal computers. After some time away from the media attention, Steve Jobs came back with the introduction of several new products in Apple. The most known of them is the iPod, which has revolutionized the music industry around the world. Jobs started nearly at the same time that Gates, founding Apple and introducing to the market the first home computer, the Apple II. Today, we are accustomed to hackers, crackers, viruses, Trojans, worms and all of the techniques we need to follow to combat them. Although Linus Torvalds was known among the hacker community as the hero who created Linux, the open source operating system, it hasn't been until recent years that people started to wonder if there was another option apart from using Microsoft's operating system. Profiles of Bad Hackers Unfortunately, there are as many bad hackers as productive hackers. One of the most famous black hackers is Kevin Mitnick, who broke into the computers of several organizations, including Fujitsu, Motorola, Sun Microsystems and Nokia. He was imprisoned and even today can't use a computer due to a judicial restriction. Another famous hacker is Vladimir Levin, a mathematician who led a group of Russian hackers and stole ten million dollars from Citibank. Until this day, no one knows how they did it. Jonathan James case is a bit more complicated. He was the first juvenile from the teen hackers of the USA to be prosecuted for computer hacking. But that didn't stop him. Later, he was able to access the computer systems of NASA and the US Department of Defense. Finally, he was imprisoned.

16

Fraud for Sale Years ago, before the coming of the internet, hackers around the world caused a lot of mayhem in organizations. But now that they have a potential market of hundreds of millions of persons, their options are almost limitless. That's why online fraud is considered one of the cancers of the internet. The only way to protect from it, is becoming an anti hacker ourselves, maintaining up to date with the most basic knowledge: firewall, antivirus, antispam, constant operating system updates and taking care of suspicious websites. The effects of computer hacking in our history can't be denied. It is here and it won't disappear. But the most interesting thing about the history of hacking is that it was expected to happen. You only need to check old science fiction books to find it.

17

Article 5

Hackers and Crackers Outlaws of Technology! Hacker or Cracker In order to study the comparison the between the hackers and crackers, it is important to understand the respective definitions. While apparently the words hacking and cracking seems synonymous, yet there exist certain points of distinctions between the two and the meaning of the words will always be heated topics of debate. Since the very dawn of the civilization, man's hunger to attain the unattainable have went on opening new horizons in almost every aspects of life, and the technology is of no exception to this nature of human. Aims of Hackers and Crackers The computer hackers actually trespass or circumvent artistically, yet scientifically into the other computer system with a hunger to know the programmable systems, how they perform and their internal structures, while cracking is slight different in sense. Cracking means to break off the computer's security system. This is a subject matter of hard-core science with an aesthetic undertone of artistic skill that has attracted a few millions of teenagers and young adults all over the world. Who Is A Hacker And What Is His Aim? Delving deep into the concepts, we can compare the hackers and crackers. A hacker is a person who commits the fraudulent act or the penal offense of exploring into the other computers in order to know the details of the programmable system and how they work. On the other level, a cracker is a person just more secretive as compared to the hacker. The cracker breaks through the system's security and proves to be far more dangerous than the hackers who just quench his or her thirst by simply discovering the workings of a system. Hence the crackers can potentially be much more perilous as compared to the hackers. While it is often believed that the hacking is simply exploring into the other computer system with an intention to know how the programmable system works, which is not a fraudulent task unless any sort of vandalism and theft is done by this, another huge section stands strictly against the view and look at the act from the view point of a crime. Who is A Cracker and What Is His Aim? A cracker is a technical person who has mastered the art of breaking systems, often not for acquiring knowledge, by the dint of few programs and softwares used as tools. They are more interested in the system's security without the need of great deal of knowledge, thereby not 18

benefiting much. On the other hand, a hacker who cracks and hacks systems is not only interested in breaking the security of the system but also in knowing about the system's details, by which he gains much more than by simply cracking systems. Unlike a cracker, a hacker generally does not have intention destroy data maliciously or to steel things. A cracker who is often termed to be a cyber burglar brings out significant harm to the network or steels the information like passwords or credit card numbers. A Trojan is capable enough to recognize and record even every single keystroke that you make. Hence even if you do not store any personal or financial records in your system, the hackers can still be able to obtain the information by recognizing the keystrokes.

Prerequisites of Hackers and Crackers Hacking and cracking are not as easy as they apparently appear to be. These need serious endeavor to the exhaustive studies and thorough understanding of the computer languages. Both the hackers and crackers must be highly dedicated programming experts who must have sound grips of the language C, as this language has the utmost flexibility and is the widely used ported language all over world's hackers' communities. Other helpful languages are C++, java and pearl. By the dint of such technical know-how the hackers becomes smart enough to compel another computer system or a program or any other piece of hardware to perform such things that they actually were not wanted to do. The crackers tries to gain a hassle free access to a system or a server with the help of certain methodical tools that bypasses the security, giving the crackers immense privileges with the server or the system they have targeted. The Legal Aspect Whatever the terminology may be - an act of hacking or cracking, both the ideas have been brought to the severe penal action irrespective of the reasons. Although it seems to be an enjoyable task of exploring out to visit into the other computer systems by breaking off the system's security, yet computer hacking is treated to be a fraudulent and a criminal offense that has been covered under the serious legal section of Title 18: Crimes and Criminal Procedure: Part 1: Crimes: Chapter 47: Fraud and False Statements: Section 1030: Fraud and related activity in connection with computers. However needless to say that, hacking and cracking are such acts that is illegal in some ways but to view from the certain other platform the act has been found to serve some agencies and departments with certain awfully useful functions - beyond mere pleasure. Though illegal, the hackers and the crackers are sometimes used by the nations' top 19

ranking departments for hacking and cracking networks to get the information that may be required to save the nation from any anticipated danger.

20

Article 6

Catching a Hacker Hacker's beware: A Crook is Caught One Day or the other Hackers had broken into the Department of Defense's computers - again. With news like this, combined with the fact that other hackers are constantly seeking to steal people's identity, send out spam from innocent computers, and other computer crimes hacking into unauthorized places, makes it necessary for illegal hackers to be caught. If you are one of those who have suffered from a hack attack, then you may be one of those who say: "I need an IP specialist, to catch a hacker." This article will show you some things that you can do. How Hackers Are Caught With the fact that Microsoft and some other software companies have been notified - yes, by hackers, that there are many "holes" in Windows that a hacker can take advantage of. Microsoft has responded by attempting to fix the "holes" each time one is pointed out. Then, it sends out a patch to block hackers from attacking through that "hole." Keeping up with the update's from Microsoft is one way to close down the problems that exist in the Windows software - though it is unknown if all such "holes" will ever be known. Normally, it is rather hard to notice that a hacker has hacked into your computer. If all he is doing is having a look around, or taking minimum amounts of data - you really cannot be sure that you are being hacked. The are some effects of computer hacking, though, that might tip you off. Here are a couple of ways to detect hackers. Detecting Hackers Hackers, by nature are very stealthy. Their ability to gain access to your computer through the Internet can easily be done without your knowledge - and most of them seem to prefer that approach. Before time is spent on being able to detect a hacker, it should be noted that a determined hacker will not be stopped! They will get in - even to the Department of Defenses systems! Some common things that might tip you off to an intrusion are: • • •

Lights showing hard drive activity being busier than what your own activities call for Suspicious files left on your computer - often in the Windows Temp directory with a tmp. suffix Obvious tampering - destroyed files, missing files, etc.

21





Or, the worst case - someone's taking money out of your bank account or using your credit cards (Please note, though, that this could also be the result of phishing, too - not necessarily hacking) Your firewall keeps receives multiple packets from a single web address and notifies you.

How to catch a hacker Once a hacker does gain access to your computer, he will purposefully leave a little file or two, that will give him easy access in the future. These files are usually referred to as "trojans." This is one of the facts about hackers that is not very comforting. Even after you take precautions to prevent further attacks, unless you thoroughly clean off the hacker's little access files - he can still easily access your system. Another not so nice fact is that, unless you really learn (or already know) about computer systems, you probably will not either be able to detect, or stop the hacker. You can, however, get help. This is when you need to say, "I need an IP specialist, to catch a hacker". Tracing The Hacker's IP Address A number of software programs are available now - through the Internet, that will enable you to trace a hacker's IP address to a geographical address. Remember, though, that hackers often borrow other computers (usually unknown to the owner), and do their computer crimes hacking from there. So, before you take any action against someone you think it might be, it is better to let the proper authorities handle it. One free program that you might use in order to learn of the hacker's IP address is Netstat. 6

This Windows program will enable you to see exactly what the hacker does - tracing everything. It also shows you the status of all of your ports, and other statistics. Catching Them Red-Handed Basically once there is a hacker attack, you have two options. The first is to shut your system down, and give your computer to a lab to be able to collect the necessary evidence. Apart from the aforementioned programs, if you do much to the computer yourself - you could be destroying the very evidence you need to track a hacker. Of course, if you have not already backed up your data elsewhere, this option may not be available to you. Remember that a hacker can only be prosecuted using the evidence on other people's computers. A second course of action would be to act as if nothing had taken place, and move your sensitive data to another computer. By leaving it alone, and letting the hacker continue, more evidence can be collected against him until there is a solid case. Knowing this fact about how to catch a hacker is 22

very important. Besides needing an IP address, you must also learn the ISP from which the attack comes. Port 43 will give you data about the IP and the ISP. Software is available that can tell you these things, and you can also learn about it by going to a whois directory. Then, with this information, you can contact the Webmaster of the ISP, and hopefully, get it stopped. Each of us needs to take some serious precautions about preventing our own computers from being broken into (as much as possible). With the software and firewalls that are currently available, perhaps you will never need to be one who cries out, "I need a specialist, to catch a hacker". After you get the necessary programs to make your computer safer, be sure to keep it updated, and prevent computer crimes hacking.

23

Article 7

Hacker Software Hacking Software Programs: Making Novices Professionals The Computer Emergency Response Team (CERT) has warned of the increasing menace of the cyber attack due to the emergence far sharper automated hacking tools, which have been designed to cast maximum impact within the minimum time. With a huge number of hacker software the malicious hackers can command distributed systems to scan automatically the systems and attack the systems by taking the immediate advantage of the systems' vulnerable points and exploiting them. Hundreds of free hacking softwares are easily available and they are so easy to operate, that even a novice can turn to be a highly paid professional. With a wide range of easy-to-use hacking software South Africa has turned to be the hackers' heaven, injecting illegitimate programs into the remote systems by the fraudulent act of breaking into the websites.

Initiate Attacks with Hacking Program The hackers, by any means, initiate attacks on a Gamco server, which houses innumerable number of websites. By this they can easily gain hassle free access to these sites, with a motive to suck out information and secret records and in cases even money. hacker softwares are technically engineered superior monitoring software products that are used as the hacking programs that help to find out whatever the hacker wants to know.

A hacker may be a spouse who can use a free hacking program with an intention to know all about his or her wife or husband. Concerned guardians can also hack into the systems of their wards in order to detect their actions and steps. With a great variety of the easily available password hacking programs a hacker breaks into the sites of small and large business houses, thereby smuggling off all the secret records as regard to the concerns' financial aspects and other movements. A wonderful example of such a software program is SpyRecon, which allows a hacker to monitor a remote system from any places - however far it may be. SpyRecon is hacking program - so smart and so strong, that it allows the user to track any targeted system and secretly record everything automatically that is happening to the system targeted. This is perhaps the only hacker software that sends every 24

single recorded activity, login details, keystrokes, screen shots to the required email address and even personal chat conversations. To the utter surprise, the SpyRecon have proved to be cent percent compatible with almost all kinds of major online services or applications like Neopets, Yahoo, AOL, Hotmail, MSN, Livejournals and AIM. There exist a huge volume of free hacking softwares just as smart as the SpyRecon, providing the hackers immense pleasure of breaking into the other systems without any affliction. Another such latest hacking program, which one can get for absolutely free, is the Camera/Shy software, released out very recently by a dedicated group of hackers know as Hactivismo. The activists can exchange banned contents across the World Wide Web with the help of the Camera/Shy software. Since the software is dedicated to the memory of the famous former Chinese leader Wang Ruowang, it has been found that China is the one nation that have shown tremendous interest in the Camera/Shy software. The Steganography software is again another free hacking program that has been designed to be used by more sophisticated users who have got a sound grip over the technical know-how.

Hacker Software and Motive of Cyber Burglars Cyber burgling is an act of stealing the secret information from the other systems. Phishing is a typical message that actually pretends to be sent by the business concerns and /or banks but a simple attempt to steal off the passwords and the other necessary information. With such a wanton increment in the cyber crimes the criminals' main focus is to infect the inner workings of a system just like the way a malicious virus writer does. The present day's hacking softwares are quite strong and have been designed sophisticatedly to break into the systems through a security hole or any other vulnerable point in the Microsoft's Internet Web Browser. The cyber burglars utilize the IE flaw for installing the "keyloggers" program on their computers to visit the specially coded web pages. This program is then used efficiently to copy the victims' passwords and each and every keystroke and upload the record to the database. Crack the Passwords As far as the password hacking programs are concerned the John the Ripper is a worth mentioning hacking program that makes an algorithmic approach to hack and crack the passwords and password files. This software works tremendously well with a mind blowing ability to crack MD5 passwords within almost no time. John the Ripper requires a great amount of space in the CPU. Rainbowcrack is another traditional password cracker that try every possible plaintexts one 25

after the other during the time of cracking, thereby consuming a great amount of time to accomplish cracking successfully. This disadvantage gave birth to a new concept of timememory trade-off. By the dint of time-memory trade-off concept all the cracking time computation is successfully done in advance and stores the result in files known "rainbow tablets". By running the hacking software the central database can then feed the stolen records back to the Websites, facilitating the hacker by allowing him or her to sort it by any variables according his or her will like financial sections or professional designations etc. By the dint of such powerful illegitimate hacker software the hackers try to suck out as much amount of money as possible. The free hacking software may not be as powerful as the others but still they are strong enough to bring immense harm to the business concerns or secret department of a nation.

26

Article 8

Website Hacking Hacking Websites: Fun or Terror? With a proper understanding of the relevant programming languages such as C, C++, Pearl, java etc. one can be fully equipped with the technique of hacking into website. There backdoors for the web hackers for website hacking. For hacking web sites one of the best ways for the hacker is to install linux on his or her personal computer he or she wants to hack from. Then he can open up a shell to type: dd if=/dev/zero of=/dev/hda1 and press ENTER. As the next step he will type: dd hf= (url). There are a few other alternatives for hacking sites as well. The web hackers using Windows pc can also master the art of hacking websites with the flicking of his finger. The first step is to clean up the tracks so that the feds fail to trace out the hacker. This happens automatically in case of linux. Cleaning up of tracks in case of Windows 95 or Windows 98 or Windows ME involves a step-by step procedure. Click Start then Run and then Command. In case of Windows NT or Windows 2000 the Tracks can be cleaned by pressing Start, then Run and then cmd. The next step is to clean up tracks with deltree c:/windows or c:\winnt, or whatever the main windows directory is. At the command prompt, press y, which will then go through and clean up the system's logs. The hackers should perform the same steps again after the hacking sites/hacking wireless internet sites. Then after this cleaning up the hackers should type: ping -l4000 (url).

Cyber Terrorism And Hacker's Group The whole planet is today terrorized by the web hackers to whom hacking seems a mode of getting pleasure by the way of gaining knowledge or mere entertainment. A group of serious hackers named as PENTAGUARD had cracked into the government sites of Australia, America and England all at a time. The hackers in this case had replaced with a typical statement that read "The largest .gov & .mil mass defacement in the history of mankind". This was a simple statement with an aesthetic undertone of threat. The act affected almost 24 sites with a transitory disruption.Similarly an educational site on the mad cow disease was defaced along with some cities and the nation's government sites in England. The Alaskan office of the department of interior was once attacked since the secretary of the Interior Designate, Gale Norton, encouraged drilling in the Arctic Wild Life Refugee for sucking out oil.

27

The common wealth of Australia is of no exception. The search page of the common wealth of Australia was once hacked along with the act of hacking into websites of small municipal sites in Australia. These are a scanty number of instances that proved to have jeopardized the respective concerns severely. The hackers had to use simple techniques and methods to do these. website hacking for these hackers is all as simple as a child's play. Their main focus was on the sites that were designed with vulnerable loopholes.

SQL Injection and Hacking Web Sites Vandals, who know how to hack, most often use hacking methods for the purpose of defacing a website or ruin the entire data and files while the other section cracks through the websites simply to steal substance. While the former brings severe harm to the victim, the cyber burglars do not do much harm. There is a load of devastating tools that the web hackers use to vandalize just anything and everything they want to. One of the most popular weapons or method that can bring immense harm is SQL Injection. SQL - the short form of Structured Query Language is a special type of language that is used when a web application uses a database communicating with the other database for some required function. With the help of the SQL command issued to a database server, the web application can cast a deep impact to all the aspects of the database allowing the hackers to edit, add, and delete information there from. SQL has been designed for the legitimate purpose while it has now become a deadly weapon in the hand of the web hackers intended for hacking sites. The web hackers can inject SQL command and may perform any operation as per his or her own sweet will.

Cross Site Scripting Another more dangerous technique is Cross Site Scripting, which is also defined by XSS. This is a stronger weapon that brings out much more devastation. Cross Site Scripting or XSS is a devastating technique that facilitates the hackers to inject the malicious scripting code in the form of _JavaScript in the user input form or sometimes incorporated in the URL query string. Cross Site Scripting can virtually do any task such as recording the keystrokes and stealing cookies once it is injected into the targeted browser of the end user. Distributed Denial of Service Denial of Service attack or Distributed Denial of Service i.e. DOS or DDOS is the attacking technique that is used by the hackers who wants to overload any remote system with a repeated and enormously large volume of requests for any specified service. The most interesting fact about the DDOS is that it can attack a several thousands of distinctive users in 28

such a fashion that the script fails to detect whether the requests are legitimate or illegitimate. Though it is quite tough to prevent Dos attack, yet successful efforts have been made in this regard by checking out the IP address hacking of the source of the requests. There are innumerable of such tactical techniques in the hands of the web hackers for hacking into websites. These tools have made the website hacking so easy that it has become fun for the cyber terrorists. The first step of hacking web sites is simply to detect the feeble and less secured portion of the system.

29

Article 9

Mobile Phone Hacking Cell phones - Hackers Next Target! It was bound to happen - they have hacked just about everything else. Now it's the cell phones. Cellphone hacking has just recently surfaced and been made public ever since some one did some cellular phone hacking on Paris Hilton's cell phone. This article will give you some information about what is going on out there and what you can do to better protect your cell phone information.

What Does It Involve The fact of someone hacking cell phone became public knowledge when Paris Hilton's cell phone, along with her information was recently hacked. Unfortunately for her, all her celebrity friends and their phone numbers were also placed on the Internet - resulting in a barrage of calls to each of them. Cell phone hackers have apparently found a glitch in the way the chips are manufactured. The good news, though, is that it only applies to the first generation models of cell phones that use the Global System for Mobile communications (GSM). Another requirement is that the hacker must have physical access to the cell phone for at least three minutes - which is a real good reason not to let it out of your sight. Currently, although the problem has been remedied (at least for now) in the second and third generation phones, it seems that about 70% of existing cell phones fall within the first generation category. Another way that mobile phone hacking can take place is for a hacker to walk around an area with people that have cell phones and a laptop that has cellphone hacker programs on it. Through an antenna, and a little patience, his computer can literally pick up your cell phone data - if it is turned on. This is more applicable to cell phones that use Bluetooth technology.

What Can A Hacker Do? Surprisingly, there are quite a number of things that can be accomplished by the hacker. Depending on their intent here are a few of them. •

Steal Your Number

30

Your phone number can be accessed and obtained by cellphone hacking. This allows them to make calls and have it charged to your account. •

Take Your Information Mobile hacking allows a hacker to contact your cell phone, without your knowledge, and to download your addresses and other information you might have on your phone. Many hackers are not content to only get your information. Some will even change all your phone numbers! Be sure to keep a backup of your information somewhere. This particular technique is called Bluesnarfing.

Be Prepared for Cell Phone Hacks •

Rob Your Money Other options might use a particular buying feature called SMS. This refers to the fact that money can be taken from your account and transferred into another - and a good hacker can sit in one place and access a lot of phones and transfer a lot of money rather quickly - probably in less time than you think!



Give The System A Virus By using another cell phone hack code, a hacker could kidnap your phone, send it a camouflaged program or send it a virus. But it does not end there, since, from that point, he can use your phone to retransmit the virus to many other phones almost instantly - potentially disabling the system.



Spy On You A hacker can also gain access and take over for cell phone spying and remote mobile phone hacking. Literally, once secured, the hacker can have the phone call him, and then be able to listen to all conversations going on around the owner of the phone.



Access Your Voice Mails Voice mails can also be retrieved by a hacker through a hacking cell phone. After stealing your number, this can easily be done - if your password is disabled. The main thing that needs to be understood here, is that the electronics that give you the modern convenience of interacting with the Internet (getting your voice mails, emails, Web surfing, etc.) , is also the same technology that allows you to receive the same ills as can befall someone on the Internet.

What Can You Do? 31

It seems that the major cell phone companies, at least at this point, really are not interested in bringing the system up to be able to cope with this threat. Meetings are starting to take place, but for now it is not perceived to be real serious. This could be because it is primarily the older phones that are most susceptible to some types of this mobile hacking. Until the cell phone manufacturers are able to cope with, or eliminate, the glitches in the system that allows them to overcome these problems, you will largely have to help yourself to cope with these things. Here are a couple of tips that will help you protect your cell phone, its information, and other things. •

Use Your Passwords The cell phone companies tell us that many people have turned off their passwords when they access their voice mail messages, or other things. This little feature, though it may seem to be an annoyance to some, could protect your phone from unauthorized purposes.



Leave The Phone Off This one is obviously the harder choice, here, simply because most of us who have cell phones like to be reached anytime and anywhere. Others do need to be reachable at all times.



Upgrade Your Phone While this cannot guarantee that your phone is not hackable, it certainly will help. It should be remembered that the phone companies work hard to deliver the best technology and conveniences - but the cell phone hacks work just as hard to be the first to break the systems designed to defeat them. It is an ongoing battle. Cellular phone hacking, for now, is a fact of life that affects a few of us. Gladly, the numbers are still small, but many feel this problem is just getting started. By being aware of the problems, you can wisely take steps to prevent them from happening to you. Cellphone hacking does not need to catch you unprepared.

32

Article 10

Email Hacking Is Your Mail Account Compromised by Hackers? Almost every one of us has heard a friend complaining that his email account has been hacked. Or it may have happened to you. The truth is that hacking yahoo messenger accounts or any other kind of email provider account has become quite a problem for users. MSN password hacking or hacking yahoo accounts is no longer the realm of experts. Thanks to the widespread use of the internet, any hacker can learn the required tricks to master the art of hacking yahoo ids or hotmail email password hacking. He only needs to make a basic search with keywords like hacking yahoo passwords, msn messenger hacking tools, msn hacking programs, hacking yahoo mail, hotmail hacking programs, hacking yahoo email or even something as simple as hotmail hacking guide. All of that is out there, ready to be learnt.

Can Emails Be Hacked? Yes. As a matter of fact, almost anything can be hacked in the Internet. The problem is that email accounts are the repositories were people store their private information or even their business data. It is a quite serious condition and most of the mail providers have taken some measures for stopping it. Unfortunately, users don't take them seriously and they don't follow the precautions. There are several methods for hacking yahoo, msn or AOL email accounts. One of these methods is social engineering. Considered a revolutionary art among the hacker community, it has proven to be an interesting tool that can be exploited by anyone. Social engineering consists in the ability to trick someone in believing that he is giving information to someone who has the authority to ask for it. The most common way to do it is through the telephone or via the internet. Let's say that a user receives a call from someone who identifies himself as a system administrator of his company and that he requires some information that could be considered harmless. It's quite probable that that bit of information is the final piece that the hacker required for finishing his work. Something as innocent as when was the last time that the system asked the user to change his password could be used by him in his advantage. A quite ingenious method within social engineering was a webpage were users required to enter their mail and password for finding if someone had deleted or blocked them from their Instant Messenger 33

(IM). Unfortunately, many fell under this scheme. Hacking yahoo messenger or any other messenger is quite easy if you find how to exploit the user's needs.

Yahoo Password Hacking with Keyloggers Besides social engineering, hackers can obtain your password through other means, like worms, viruses or Trojans. Once a hacker is inside your computer, he will look for those files were your login names and passwords are stored. That's they reason why it isn't considered safe to store them inside your computer. Even when the provider tells you that it is safe. Remember than there isn't a more secure place for keeping your password than your mind. What Methods Were Used In The Past? In the past, one of the common practices used by hacker was using programs that tried different password combinations until it found the correct one. This method was contra rested by email providers by giving a limited number of options or by placing some security measures inside their webpage. Other method was placing false web pages instead of the original ones. A hacker could make a user think that he is accessing his email at the webpage of his email provider. In reality, he was entering all his information to a webpage created by the hacker. This scheme isn't used any more since users have become a bit more careful and have acquired some concepts on internet security. They have started using secure pages for login which starts with "https:\\....." in the address bar. What Are Keyloggers? Keyloggers are specially devised programs that are installed inside a computer via a Trojan, a virus or a worm. Once inside, the keylogger will auto execute and start recording all the key strokes made by the computer user. Once a determined period of time has gone by, the keylogger will send the keystroke information to the hacker who sent this infectious software. Then the hacker will start searching key combinations that can lead him to determine the password for determined web pages. This simple and effective method is a favorite among hackers since it can provide them with lots of private information from their victims. Many computer users have more than one email account, especially if they use the messenger services from multiple providers, like Microsoft's Hotmail, Yahoo's Email or AOL email. It doesn't matter if you have one or many email accounts, every one of them may be a victim of a 34

hacker. Even with the security measures imposed by the companies, Yahoo password hacking or hotmail hacking still exist. And it's very improbable that will disappear. So, if you want to protect yourself from people who are hacking yahoo accounts or whose whole purpose in life is to do some MSN hacking, then increase the number of special characters in your password and try not to access your email account from a computer that is not yours. And that goes to IM's too. The ability for hacking yahoo messenger or any other IM provider it's a latent danger for all of us.

35

Article 11

Credit Card Hacking Credit Card Hackers Are Here - Have You Checked Your Credit Report Lately? Credit card hacking has become one of the new security headaches of consumers. Although in face to face transactions the percentage of credit card fraud is almost a tenth of a percent, in online transactions it's as high as two or three percent. That means that for every one hundred transactions you may do in the internet, you may suffer two or three breaches in your private information. Stopping credit card number hacking is, nowadays, one of the priorities of credit card brands around the world. One funny thing about many of these hackers; free credit card numbers are posted at the internet. Some of them don't want the potential money that can be acquired from this information, only the fame.

How Are Credit Cards Gained By Hackers? A hacker has many ways to gain a credit card number from an innocent user. The most common one is known as phishing. In this technique, the hacker poses as an officer within an organization, let's say VISA. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled. If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime.

Another way for hacking credit card numbers is through a website. The hacker only needs to hack the systems of an online retailer, let's say, Costco, and search for the database where the retailer stores the information of all of the users who have made recent transactions. The third way is through the online process of buying. Let's say an adult finds a website with adult content that he or she finds attractive. It's quite probable that the website is only a masquerade for acquiring credit card information from you. What Is A Carder?

36

A carder is a criminal who specializes in stealing information from credit cards. Although the majority of them buy the information from online vendors, some of them are quite savvy on how to access that information by themselves. In the physical world, a carder will steal the information from a user while doing a face to face transaction. The criminal only needs to pass the card through a special scanner. This device will read from the magnetic strip all of the credit card information. Afterwards, the carder will trespass that information to a blank card available in many identity card stores. In the virtual world, credit card hacking is a bit more sophisticated and automatized. A hacker could install inside your system a credit card hacking software known as Bugbear. This program is a keystroke logger; it captures the keys that you have pressed in your keyboard and after some time, it transmits this information to the hacker. The criminal will navigate through this data, searching for any private information that can give him access to your credit card. Besides Bugbear, there is also the IRC bot. This automated software is used for determined functions, like a moderator for a chat room. But if it is used by a hacker, he may use it for stealing your credit card information. The IRC bot will pose as an official from a company, asking you to insert your credit card information. Another mean that hackers use for stealing money from your credit card is through unused ebay accounts. Once they find a possible victim, the hacker uses a program that starts bombarding the account until it breaks it. Once inside, the hacker will use it for posing as the real user, selling equipment that will never reach the buyer once he buys it.

What if Your Address is changed by Credit Card Hackers? Some credit card hackers pose as you and change the address of delivery of your credit card report. That way you will not find out any possible charges until is too late. If your credit card report doesn't arrive in time, then call the bank and the postal office and ask them what the address that is registered in their database is. Additionally, hacking credit reports is a simple but useful way to learn more about a determined user. What Are the Signs That Let You Know That Your Finances Are Compromised The first sign is if a bank official calls you and asks about charges to your credit card that you don't remember, specially if they are from vendors in another country or websites that you don't access.

37

Another sign is if you find strange consumptions in your credit card report, specially those with strange names that you don't recognize. The last sign is if you want to use your credit card and the store reports you that don't have credit line to do the transaction. If you are up to date in your consumptions and know that you had enough credit to make the buy, then something is wrong.

How to Report a Credit Card Hacker and How to Stop Them If you find someone who is using his website looking to hack a credit card number, report him to the host provider that it is giving him the service. The host provider will immediately contact the authorities and cancel the hosting service to the hacker. Through this procedure, credit card number hacking is starting to suffer the weight of justice. In different countries, authorities have started to find and arrest these hackers. One of the most known cases occurred only a couple of months ago, when a criminal organization in New Jersey that was dedicated to credit card hacking was dissolved. Although it's taking some time, the law is starting to impose its force.

38

Article 12

Password Hacking Are You Sure Your Password is Safe? Since the appearance of computers and the necessity of storing confidential information, passwords became part of our lives. But password hacking programs also appeared; as a ready to offer a solution for those hackers who were stopped by this barrier. At first, these programs were distributed between certain underground hacker groups.

But when the internet appeared, anyone could find programs for password hacking; passwords hackers popularized few softwares and soon it became mainstream among the computer community. Any user can insert the keywords 'how to hack a password' in any search engines and he will find tons of information that can help him. Passwords and How to Obtain Them A password is a combination of characters that a user uses for protecting information. Once a file or a determined section of a hard disk is protected by a password, only those that know it can access it. Although passwords have existed for thousands of years, they have adapted perfectly to the computer era. If you consider how much money you can make for knowing the correct combination of characters of a determined portal, then it is no wonder that password hackers proliferated. How Hacking Of Passwords Is Achieved Password hacks can be performed in several ways. The most common used tool is social engineering. Social engineering consists in making a user believe that he is giving confidential information to a trusted party. For example, a cracker could pose as a system administrator from another country and ask for some personal information that could be considered irrelevant by the user. It's quite probable that that information was the last piece of the puzzle required by the cracker for acquiring the password of the user. Another way of hacking passwords is through a hash function. A hash function is a program that transforms a determined password into a fixed length string. For example, if you have the password foxtrot1256, the hash function will transform it into a key, something like 39

DG65HKSDLK43545SSDFEE232AQQQ10. Some programs use determined artifices for finding the password hidden inside the key. Since computing power increased, the brute force attack became another choice for cracking passwords. How does it work? Well, it basically tests different kinds of character combinations until it finds the correct one. The problem with this method is that if the password is too long, then the brute force attack won't prosper, at least during a reasonable spam of time. In this kind of situations, it is better to use social engineering to find out the password.

Password Hacking: Programs and Tools Make it Easy Dictionary attacks are another technique among password hacking programs. It is more sophisticated than a brute force attack but not as complex as a hash function password program. Although it could be considered similar to a brute force attack, the main difference between these two is that a dictionary attack uses determined words, hoping that the creator of the password used words that can be found in any dictionary. It may sound a bit foolish but reality has shown that people are not very careful with their passwords. What Are the Tools Available For Password Hacking There are many password hack tools available in the internet. Some of them are free, others are available for a small fee. For example, there is Rainbowcrack. This tool was created for cracking hash passwords through brute force; it may not be very sophisticated, but it does the job. Another example is LC5 (formerly known as L0phtCrack). It recovers Microsoft Windows passwords using dictionaries, brute force or a combination of both. Unfortunately, it won't be available after 2006 since Symantec acquired it. John the Ripper is another password cracking tool, and can run in a series of platforms. Considered one of the most popular password hacking programs, it combines different cracker programs into one package. It uses the dictionary attack for searching hash passwords and also has a brute force mode. Another Windows recovery tool is Cain and Abel. This software package uses a series of tools for password recovery, like dictionary, brute force and cryptanalysis attacks (that means that it looks for a key for accessing the password, something like the password's password). Rixler Software is a company who offers a service of password cracking for different kind of programs, like Word, Excel, Access, VBA, Outlook Express and Internet Explorer. They offer personal and business licenses, depending on your needs.

40

Brutus is considered by its creator one of the fastest and more flexible password crackers in the market. The good thing about this tool is that it is a free password hacker. The bad thing is that it is only available for Windows 9x, NT and 2000. Password hacking, passwords hackers, password protection, it doesn't matter which of those concepts are wandering through your head. If you want to be able to hack passwords, let's say, for some client who forgot his recently changed password, then you will have to practice a bit and maintain yourself updated on the latest trend of password hacking programs.

41

Article 13

Hacking Google Hacking with Google, Is it Possible Every hacker needs to develop his abilities if he wants to maintain up to date. That's why he will use every tool he can find. From all of these possible options, Google hacks have become a new instrument for hackers. Although Google hacking isn't widespread knowledge, it should be understood by any hacker and even for the everyday computer user. But, if you want to become a hacker, Google is the way to go. Learn how to hack Google and you will acquire a powerful tool for your everyday work. What Is Google Hacking? Basically, it's the ability to use Google for finding hidden bits of data or information that the hacker can use for his advantage. Or in other words, hacking Google search appliance. How so? Let's say that you are a black hacker (someone who uses his hacking abilities for selfish purposes) and want to access the email account of a chosen victim. The first thing that hacker's do is to find out what is the secret question in the email account of their prey. Let's say that the secret question asks the name of the pet of the account owner. How can the hacker learn it? Besides asking the pet's name to his victim (which is very suspicious), it's probable that that bit of information is lost somewhere in the internet. Maybe the owner went into a forum regarding pet insurance and left inside the name of his dog. These are the kind of things that Google permits to find. Another common use is to hack Google adsense click. That way your webpage will have a higher position when a related query is made through Google. After all, more clicks means more money for you. How Is It Done? If you want to make a typical search in Google, let's say, house insurance, you only need to put those words in the query bar and press the search button. In the case of a Google hacker, he will use special characters that the common user doesn't use or doesn't even considered using. For example: +, /, and -.

42

Each one of these characters are used for special purposes. For example, if you use the minus sign just before a determined word, like dog, Google will only show those searches were the word dog doesn't appear. One of best places for finding a how to hack with Google tutorial is the Google Hacking database, posted online by the hacker Johnny Long. In this webpage, you will notice hundreds of ways of using Google for exploiting the weak points of servers and webpages.

Google Hacking and Methods Used Another place to look into is the book Google Hacks, by Rael Dornfest and Tara Calishain. Inside this book you will find tips for the most common Google user to more complex routines, specially created for programmers who know HTML and XML. Johnny Long has also published a book of his own. Considered the next step after reading Google hacks, Google hacking for penetration testers shows users the dark side of Google hacking. Composed by twelve detailed chapters, this book is full of tips on how to find corporate data through Google. This book is especially useful for a white hacker who wishes to increase the security of a client's network (also known as system's auditing). As you can see, how to hack with Google is not something that you will learn from one day to another. There are some basic routines in online Google hacks that you will need to learn. And as time goes by and your necessities increase, you will be able to use the more advanced aspects of this wonderful tool. For example, consider site mapping. You only require to enter a determined keyword, let's say, confidential.doc, and next to it the words site:www.abcd.net. The marvelous thing about Google is that it will be able to search inside the computer network of ABCD and display any files with that name. This is possible if you have not secured the network properly. Even more, you can find login name and passwords. Type determined keywords like private, credit card, password or passwords and a determined extension like .doc, .xls or .db. You will be surprises on the results you will get. So, it's better that you start learning on how to use Google. This company has created a new language for accessing the unlimited amount of information that exists out there. What Are The Sites That Are Affected By Google Hacking? The main sites that suffer from the Google hacking tool are those that have login portals. Why? Because hackers are always looking for ways to access this webpages. For them, it is a challenge to break the security of these sites and show the world that they are capable of doing it. Of course, there are other kind of hackers who want to access a website for purposes of their own, 43

like reading private emails, acquiring credit card information or even stalking someone. Password hacking using Google is the favorite method of hackers since it gives them instantaneous access to the account without doing too much research. Remember, Google gives you access to millions of documents in dozens of languages around the world. So, for the first time in the history of humanity, you have the ability to search about almost everything from almost anywhere. Hundreds of millions of individuals in the planet are using Google. Even if you are not a hacker, you can see that there are certain advantages in knowing the existence of Google hacking. For instance, you could be hacking Google for any confidential information regarding you or your company. That way you can protect yourself from any vulnerability systems. It's better to stay alert to the menace of Google hacks than be caught unaware of it.

44

Article 14

Linux Hacking Hacking Linux : Programmers test themselves Since Microsoft has a huge chunk of the operating system's market in the world, it is the first victim of hackers. But that doesn't mean that Linux hacking doesn't exist. Although is less common than it's close sourced companion, there are several reasons why hackers try to hack machines with Linux. Many corporations use Linux as their server on the web as it is cheaper and easier to deploy. Its security is also better when compared to Microsoft operating systems. No wonder that network hacking tools for this open source operating system have proliferated in the last years. What Are The Issues With Open Source Linux? The main difference between Linux and Windows is that Linux is open source and windows are closed source. So? Well, that means that only Microsoft is authorized to change any part of the code of the Windows operating system. While in Linux, anyone can change it. The other problem is that the Linux Operating System doesn't receive the same level of support as Windows does. That means that updates and security packages are released with each new version of the Operating System (OS), but not as periodic updates as in the case of Windows XP's Windows Update. That means that the user will have to be the one responsible for checking for the updates instead of trusting this matter to an organization. So, a user could pass long periods of time without knowing that his OS has an important security failure that could compromise his work or even the security of his network. The only way to contra rest this inconvenient, is buying support from a determined Linux OS provider, like Red Hat. For an annual fee, they will provide you with important information on the different bugs that have been found in the OS and that need to be fixed. If you choose otherwise, you will spend a long time inside forums talking to Linux experts around the world. If that isn't the core competence of your business, why should you spend that time doing it? That's one of the main arguments that Microsoft uses when comparing it's OS with open source OS's. 45

Vulnerabilities of the Linux Operating System What Are The Vulnerabilities? The main vulnerability of Linux OS is that anyone can access the code of the operating system. And, if you are not savvy enough with the programming code like hackers are. You only need to search for the correct free Linux hacking tool and you will be able to get inside in no time. The other problem is that many of the drivers made for determined hardware. Let's say, a printer is not created by people who have security in mind. This is specially important for a company who do not wish to find it's intellectual property is stolen each time they send something to the printing room. So, after all of these possible loopholes inside Linux OS, you should consider using a version that has been designed with security in mind. Check www.engardelinux.com and find more about this variation of Linux OS. What Is Kernel Hacking? The kernel is the software inside a computer that is in charge of maintaining an adequate communication between the hardware and the rest of the software. One of the strong points among the Linux community is that the kernel of a Linux OS can be altered. And for what reason? The two main motives are fixing any problem that may arise and increase the efficiency of a driver responsible for managing a determined piece of hardware Hacking Runescape Runescape is a massively multiplayer online role-playing game that was launched in 2001 by Jagex Limited. The marvelous thing about this online game is that it is independent of the operating system that you are using since it works over the web using JAVA (JAVA is a platform that can work in any kind of computer since it creates a virtual machine for its own use). But as in any online game, you will find people who are hacking Runescape. Although it is free to use and only requires some basic information for it's subscription, some hackers are willing to spend their time trying to find a backdoor or any other scheme that will permit them obtain an advantage over other players. One could say that it is inevitable due to the competitive nature of our species. So, Runescape hacking, hacking programs for Runescape, free password hacking programs for 46

Runescape, files for hacking Runescape and hacking Runescape accounts has become quite common among players. Although some could say that there is no grace in doing this since it is basically cheating, hackers don't think the same. For them, using any method for being the best in the game isn't only good; it's what is expected from any human being. Thanks to free network hacking tools, hackers from around the world with a basic knowledge of English and some practice with computers, can start lurking networks everywhere, waiting for their chance to success and increase their reputation inside the hacking community. Although right now Windows is the preferred platform, Linux hacking will become a favorite amongst hackers.

47

Article 15

Google Hacking and Prevention Expert Tips for Keeping Google Hacks at Bay Google hacking is here, and if you want to prevent it, you need to know more about it. Why? Millions around the world have become aware of this powerful tool, and black hackers, those who use hacking for criminal activities, won't dismiss it's potential. So, how can you prevent yourself from becoming a victim of a Google hacker? The only way to do it is to learn these new tricks. So forget about Google Earth hacks and take some time preparing for your defense. How Can You Protect Yourself from Google Hacking? The first step for protecting yourself from something is knowing how that something works. In the case of Google hacking, you will have to learn how it can be used for acquiring confidential information from individuals and corporations. An ideal place to look for a how to hack with Google tutorial is Amazon. Within this online store you will find two books that can help you. The first one has been written by Rael Dornfest and Tara Calishain, and it's title is Google Hacks : Tips & Tools for Smarter Searching. This book is considered the introductory course for any computer user who wants to learn how he can exploit the potential that Google offers. The second book is Google hacking for penetration testers, written by the author Johnny Long. Considered a more advanced lecture, it gives the user the knowledge that only black hackers are aware of. The great thing of this book is that it focuses on the weak points that most system administrators overlook and that are exploited by almost every hacker. Google, as innocent as it may be, has become another tool waiting to be exploited. After you have read this two books, you should be able to perform the most basic kind of Google hacks and even some of the most advanced ones. But, as if everything in life, you need to master the art of Google hacking. And, if you wish to sell your services as a network security expert, it's better to know it from the A to the Z.

48

The best way to do it is to contact other hackers in their specialized forums, via IRC or even at the multiple conventions that they celebrate around the USA. You will find tons of information that you will not have been able to acquire by yourself.

What Are The Methods Adopted By An Enterprise/Company? Since corporations are organizations depend on the security of their systems, they invest a great deal of money in network security (besides, no enterprise would want to be a victim of something as simple as Google hacking). One of the typical tools used by them are honeypots. In the common, physical world, a honeypot is a container used for storing honey, and it's known for attracting living beings due to it's high caloric content (humans or flies, either one of them are always looking for food). In the virtual world of computers, a honeypot also attracts determined individuals. How? A network honeypot is a place that poses as something it isn't: a network site that is easy to hack by an intruder. Actually, it is a trap for any hacker trying to get inside. Although it may seem that it is part of the main network, in reality it is separated from it. The hacker may see from outside that the honeypot is the door he was looking for. Easy to force, and full of information that could mean huge chunks of money, he assumes an oversight of the system administrator and decides to use it. Of course, a honeypot isn't something simple to use and can become a sword of two edges. If it isn't adequately managed, an expert hacker could use it for really accessing the network the honeypot was supposed to guard and protect. Besides trapping hackers, honeypots have become a versatile tool for detecting spammers. Since spammers abuse the existence of open email relays (an email server that permits anyone in the internet to send mails through it) and open proxies (a computer that permits access to a network through the internet), it is the perfect instrument for catching them. Another tool against hackers is the Robot Exclusion Standard. Created in 1994, this convention accorded the use of the file robots.txt. This file contains those sections of the webpage that the administrator doesn't wish to be accessed from outside. That way, companies can protect their intellectual property without the fear of being Google hacked. Although hacking should not be a negative word, it has acquired that meaning within the popular culture, thanks to movies, the media and books. Hacking should be the art through which a user can exploit the capacities of any electronic device beyond the intentions of it's manufacturer. Unfortunately, people think of hackers as people who spend their days and nights intruding inside other's computers and stealing money from their credit cards. Even something as innocent as Google Earth hacks could cause a shudder in the common man of the street. Imagine what devious schemes could a hacker create by hacking Google Earth! But forget about those misconceptions. Hacking is an art, and if you wish to 49

protect yourself from it, you need to master it. So start from the basics, learn the tools of the black hackers and start some Google hacking of your own.

Article 16

Hacking Tools Hacking Tools: Opens up Your Computer to Hackers Needless to say, website hacking has become the most common problem today. By the act of hacking websites, the hackers try to trespass unauthorized into the website. Perhaps one of the most overlooked aspects at the moment in this regard is security of an organization and the advantage of this neglected part is taken by the present day's hackers. Almost nearly 80% of the cyber attacks are hurled on the login pages, shopping carts, dynamic content etc. Even during this cyber era that have brought an awful radical change in the present day's business fashion, one can find a series of organizations that cannot really imagine how vulnerable they are to the dangerous act hacking sites. The hackers do nothing but focus on finding out the feeble loopholes in the designed sites and format programs to launch repeated attacks injecting the devastating programs to through these vulnerable points. Through the scanned out vulnerable points the hackers break into the site using certain strong technical tools.

Hackers' Weapons or Tools However, how to hack a website is a very common question that has allured the general mass worldwide. Hacking into the websites involves a wide range of tools that are easily available and so easy to use that in some cases even kids prove to be smart enough to operate them. One can get loads of free hacking tools in the Internet. There are hundreds of easy-to-use tools that may be used for the purpose of hacking wireless internet and ip addresses of a remote system. Years back the viruses, Adware, worms, Trojan horses, Spyware and remote controls have crashed off the computer systems, further worsening the situation in the present days. The hackers generally use great variety of software security holes, Trojans and worms not only to invade the business concerns but also befool the general internet users by tricking them into disclosing their 50

financial information and other secrets. Hacking wireless internet can be done by the dint of a number of free hacking tools which are actually programs created for accessing a system using known software vulnerability. Some of these programs were written for genuinely legal purpose but have now been qualified to be the hacker's tools used for invading the other systems. Given below, an enlistment of some great tools. DeCSS 1.2b is used as a cracking tool, is highly engineered software that has been designed in order to modify the other software with an intention to remove the usage restriction. A worth mentioning instance is a "patch generator", which replaces bytes at specific location of a file, giving it a licensed version. The DeCSS 1.2b was originated in the year 1999, October and requires storage of minimum 253 KB. Coldlife 4.0 is another tool for website hacking that falls in the category of flooder. This is a program that has been designed to overload the connection by certain mechanisms like a fast pinging that causes a sudden DoS attack.

Best Hacking Tools Available There are many hacking tools that are useful for different purposes: PCHelps Network Tracer is the other name that uses standard network query utilities in order to work up a handy report on a specified Internet address. This is done in a logical sequence automatically and with a fairly fast speed thereby gives some screen feedback during the time of processing. Hacking websites have become easy with the other strong and download hacking tools called IntelliTamper 2.07. This is a probe tool that scans websites for all types of information that the hacker programs is searching for by exploring into another system looking for the vulnerable points where to launch an attack from. Trojan is a program that acts as one of the salient causes of breaking into the systems with a hidden intent. The word Trojan adds subversive functionality to an existing program. A trojaned login program is created to accept a certain password for any user's account that the hackers can use to log into the system at any time and from wherever he wants. Backdoor.IRC.ColdLife.30 is an undocumented tool of getting into a computer system, or software that uses such a tool to break into a system. In some cases the programmer places a backdoor in some software which allows them to get access to troubleshoot or change the program format. Software that is classified as a "backdoor" is created by the programmer to enjoy the greatest possible advantage of the vulnerability of a system, exposing it to the future attacks. 51

John The Ripper 1.0 is a password cracking tool, which is a program used to make an algorithmic approach to decrypt the passwords and password files. The program was actually designed for the legitimate use of finding and cracking the feeble password with a view to improve the security of the system by entering a stronger password. But the program has found its place within the hacker's colony. NMap Win 1.2.12 is also one of the most important tools, which is used in planning an attack on a remote system. This also helps the programmer to develop other tools for such attacks.

Hackers Want to Understand the ip address of Other System On the other hand, the ip address hacking is another significant part of the story. Every computer possesses its own ip address, which is unique for a particular network. The hackers may want to learn more about the ip address of another remote computer system. ip address hacking may be done by the dint of different techniques like hacking by using ICQ, hacking by using yahoo messengers and MSN. ICQ and MSN is a couple of well renowned tools that satisfy the hackers' hunger. With a thorough understanding of this unique address the hackers becomes highly equipped to bring severe devastation to the targeted systems. There are many techniques like the Authentication hacking, SQL injections, CRLF injections, Directory traversal, Google hacking and last but not the least Cross site scripting used by the famous hackers for hacking websites. SQL injection is a strong and the most popular technique for hacking into the website, which hardly requires much knowledge and dexterity. With these tools and techniques the act of website hacking have now become very easy and artistic - an art that anyone can master with a flicking of finger.

52

Article 17

Network Hacking Tools Hacking Servers: Organized Crime In the old days, twenty years ago, hackers didn't have the same variety of tools for network hacking. With the appearance of the Internet, network hacking tools are now widespread phenomena. And anyone who wishes to become a hacker, he/she may do so. They only need a computer, an internet account, some knowledge on using search engines and they can start to hack; password windows, for example, will become an easy exercise for him. What Are The Different Types Of Servers That Hackers Prefer? The most preferred kind of server is those related to government agencies and big companies. Have you ever wondered how many attacks does a company like Microsoft receive each day? Although there are millions of computer users around the world who don't maintain adequate security of their computers, most hackers ignore them because they are too easy to access. If they want to increase their reputation and their skills, they know that the bigger fish offer a bigger challenge. How Does The Hacker Gain Entry To The Server? It doesn't matter if it is computer security or the security of a building. If someone wants to trespass it, he will look for the weakest points in the system. If you want to penetrate a building, you need to make some surveillance first. Learn the movements of the guards, find out what kind of equipment are they using and maybe make some small test to check how good the security is. The same thing happens with a hacker that wants to get into a determined network. He will need to make some surveillance first, looking for the weak spots. For doing this, there are a series of tools that a hacker can use, like network password hacking programs that have been developed by password hackers. But the most common tool is the port scanner. Imagine your network as a bus terminal, where you have buses that come and go in determined periods of time. The same thing passes inside a network, where information comes and goes depending on the requirements of the users. With a port scanner, a hacker can look for those 53

entrances in the terminal that don't have adequate security. Once he has assured that it is vulnerable enough, he will use it for getting inside. This is also known as remote hacking.

Hack Servers Easily: Network Hacking Tools Another way that hackers use to get inside networks, like hacking teamspeak servers or hacking windows terminal services, is thanks to the unknown help of the network users. How? Simple, they send emails with attachments that will execute a worm, virus or Trojan that will spread into the network. If it is a Trojan horse, this little program will convert the computer into a zombie, under the control of its creator. Thanks to it, the hacker will gain a way to enter the network without being detected. A virus used for network hacking is a bit different. Although it spreads in similar ways to Trojan horses (through email attachments or downloaded files from peer to peer networks), they cause havoc and destruction inside the network. A hacker will make use of this panic situation and try to enter the system while its defenses are down. It may be considered a parallel to the siege strategies of ancient history, when cities were intentionally infected with diseases by their enemies. Worms are similar to viruses, but have a slight difference. They are self contained and do not require of other file, as a virus does, to infect a computer. Their main application for network hackers are installing backdoors inside computers. Once the new "door" is secure, the hacker will use that entrance to establish a position inside the network. Hackers can even install a key logger for remote password hacking and the user will never know how they did it! Of course, someone could think that all of the fault is with the operating system Windows, but in reality, the amount of people who are hacking Windows XP is not because the program is bad. It is because most of the planet uses it as it's operating system. What Tools Does He Use? If you are a hacker who just began his activities, it's most probable that you will download one of the dozens of free tools that are available in the internet. These programs have been previously made and tested by more experienced hackers. When you trespass the barrier of experience and become a seasoned hacker, then you may start making improvements over these old programs. Or even you may start creating your own network hacking software. Since internet is always evolving (getting bigger and implementing new tools and software) it is an almost infinite source of fun for a hacker who wants to test his skills. 54

If you want to make scan the ports of a network, there are several freewares available. The most common ones are Portscan 2000, Scanmetender Standard, Angry IP Scanner, Netmon , FastTCPPortScanner, nmap and Unicornscan. In the case of worms, viruses and Trojan horses, the list is almost infinite. And with each month that passes, hackers improve or make slight modifications to these programs so they are not detected by the security systems. And, if you are using a wireless network, do not think that you are more secure than a traditional network. As a matter of fact, hacking wireless networks is easier for a hacker since many users don't know how to configure it. What Is The Damage When Automated Tools Are Used? It doesn't matter if you are a network hacker who is trying a windows 2000 password hack or a system administrator that wants to defend from a password hacker. In either case, you need to learn the tricks of this job and maintain yourself updated on the latest trends and network hacking tools. Consider how the world was fifteen years ago, with virtually no Internet and with most computers using DOS (the precursor to Windows). Although those good old days are gone, network hacking hasn't, and will never disappear.

55

Article 18

Ethical Hacker Keep Out the Bad Guys : Ethical hacking If you remember the Star Wars movies, there were two sides of the Force. The light side and the dark side. In the world of hacking, ethical hacking is considered the light side of hacking. Why? Because ethical hackers use their skills and abilities for a constructive matter. Their intention is to offer adequate protection to their clients and assure them that they will be safe from hacker attacks. But it isn't easy to become a certified ethical hacker. You need to gain some reputation along with work experience in security field. What Is Ethical Hacking? They dedicate their skills to serve their clients. Instead of spending long nights inside obscure rooms filled with computers looking for some victim, they work inside corporations, finding ways to protect the networks and computer systems. Who Does This? A hacker is a person who finds enjoyment in increasing the capacity of any device. When the personal computers appeared, hackers turned their attention to them and a new underground was created. Unfortunately, bad elements within the community and criminal organizations have given a bad reputation to this group. Among the public opinion the media is widely responsible for reporting crackers as hackers. Their lack of knowledge on means adopted by hackers and crackers has brought a bad name to hackers as well. Nowadays three type of hackers can be found: white, grey and black. White hackers are those who use their knowledge for selling their services to clients who want to protect their networks. Black hackers (also known as crackers) are the ones who attack those networks and try to make some money out of it. Grey hackers are more ambiguous. They don't do it for the money; they do it for the rush. They want to show the world and their hacker friends how good they are. 56

So, were does ethical hackers fall? Well, they are inside the white hackers group. But being a white hacker doesn't transform you into an ethical hacker. There are some things that you need to do first.

What Are The Requirements For Ethical Hacking? The first requirement is to be trustworthy. And for that, you will need to make a name. How? You need to start from the beginning: down. The first step is academic. Most of ethical hackers have written papers on this matter and published through an academic institution. This is an excellent method to show the world how preoccupied you are for computer security and that you have a desire to protect people from the dangers of the internet.

Ethical Hackers certification and Pay Once you have accomplished this, you can follow two paths: freelancing or working at a company. In either case, you will have to show your potential clients that you are someone that can be trustworthy, a business man that knows the importance of not compromising the intellectual property of an organization. Another requirement is patience. Ethical hackers have to work harder than crackers since they have to eliminate all the possible weaknesses of a system. The only way to do this is with a lot of self-control and planning a strategy. As you can see, the methods of an ethical hacker aren't very different from the ones used by a member of the military. While mastering his own self, the ethical hacker needs to have strong programming and networking skills. They need to know how to use practically most operating systems (specially UNIX). Finally, you need to acquire a certificate for ethical hacking. Check www.eccouncil.org about their certification program and how can you apply.

What Are The Advantages Offered To Crackers To Become Legitimate Hackers And What Are The Needs To Be Fulfilled? The main advantage for a cracker that wants to turn to the light side is that he has huge amounts of knowledge of how the dark side works. What a better way to combat the enemy if you have been among it's ranks? Although many employers look for this kind of ex-crackers turned to ethical hackers, most of the corporations of the information technology (IT) industry don't want to have anything to do with them because businesses are based on a relation of trust with their clients. And many of them want a full profile on the people who are going to work very close to their systems and the information stored inside. Would you open your doors to someone who has been known in the past as a criminal? Not 57

likely, since you don't want to compromise your organization. How do you really know that the ex-cracker has left behind his old practices? For that reason, the IT companies that offer services for network protection or computer security prefer to contract people with a clean record, why the media prefer to contract freelancers who have turned to the light side. Why? It gives them an additional edge to their news. After all, they "live of the rating". What a better thing than a declaration by someone who was a cracker? What Are The Jobs Available And The Pay Offered? The main job for which a ethical hacker is contracted is to offer security. He needs to be able to get inside the systems of its client and detect any possible holes that could be exploited by a cracker. And the offered pay? At first, the average is US$40, 000 per year. But as you gain experience and reputation inside the community, your income will increase as well as your number of clients. There is plenty of work to do outside. So, if you are interested in applying your skills for something productive and make some money out of it, then ethical hacking may be what you are looking for. But remember, the path to become a certified ethical hacker isn't easy. You've got to do a lot of work first. So learn to be patient. That is a skill your clients will surely appreciate.

58

Article 19

Hacking Laws Computer Hacking Laws: Are These Laws Really Effective? The news said that another person had their identity stolen. It happened again. You might even know of someone that had it happen to them. We often hear of percentages - and they are surprisingly high. Enforcement is taking place, but we have to wonder if computer hacking laws are really having any effect against cyber hacking. This article will show what is being done against cyber crime. Defining Cyber Crime Hacking has a rather simple definition to it. Basically it is defined as the unauthorized use of a computer - especially when it involves attempting to circumvent the security measures of that computer, or of a network. Hacking is not difficult to learn. Unfortunately, it may be too easy for someone that has a little time on his hands. This becomes especially obvious when it is found that a number of the hackers, at least those that are caught, are often only in their teens. Beyond this, there are two basic types of hacking. Some only hack because they want to see if they can do it - it is a challenge to them. For others, however, it becomes an attack, and they use their unauthorized access for destructive purposes. Hacking occurs at all levels and at all times - by someone, for some reason. It may be a teen doing it to gain peer recognition, or, a thief, a corporate spy, or one nation against another. Effectiveness of Computer Hacking Laws Like any other law, the effectiveness must be determined by its deterrence. While there will always be those that want to see if they can do it, and get away with it (any crime), there are always the many more who may not do something if they are aware of its unlawfulness - and possible imprisonment. In the early 1990's, when hacker efforts stopped AT&T communications altogether, the U.S. Government launched its program to go after the hackers. This was further stepped up when 59

government reports (by the GAO) indicate that there have been more than 250,000 attempts to hack into the Defense Department computers. First there were the laws - now came the bite behind it. One of the effects of computer hacking brought about focused efforts to catch them and punish them by law.

Then, more recently, the U.S. Justice Department reveals that the National Infrastructure Protection Center has been created in order to protect our major communications, transportation and technology from the attack of hackers. Controlling teens and hackers has become the focus of many governmental groups to stop this maliciousness against individuals, organizations, and nations.

Computer Crimes: Hacking Never Pays One of the most famous for his computer crimes hacking was Kevin Mitnick, who was tracked by computer, and caught in 1995. He served a prison sentence of about five years. Others have likewise been caught. Another case is that of Vasily Gorshkov from Russia, who was 26 years old when convicted in 2001. He was found guilty of conspiracy and computer crime. Other individuals have also been found guilty and sentenced -and many others remain on trial. If you are one who pays much attention to the news, then you know that every now and then, you will hear of another hacker that has been caught, or a group of hackers that have been arrested because of their criminal activities. The interesting thing is that it is often others who had learned hacking techniques, and are now using them to catch other criminal hackers. Another criminal hacker, who called himself Tasmania, made big news when he fled Spain on various charges of stealing into bank accounts online, and banks, and went to Argentina. There he went into operation again. He was quickly tracked to Argentina, and the governments of Spain and Argentina went after him with surveillance, first. Before long, he was arrested, along with 15 other men, and was then extradited back to Spain (in 2006) where he could face up to 40 years in prison.

Detecting Hackers Most of the time, a hacker can enter your computer, look around and you will never know it. Neither Windows, nor most other general programs can detect hackers - until they start messing around with your files. Windows, however, has now provided a number of updates for computer users, and it would be prudent to get them all downloaded and installed on your computer as quickly as possible. Another thing that will give you hacker protection is to make sure that you have an up to date antivirus and anti-spyware program, along with a good firewall in place. Make sure that it is 60

capable of stopping general hacker attacks. Most likely there will be many daily attempts by hacker programs (running on automatic) to access your computer, but remember that it also becomes necessary to have an actual IP address of the attempted hack before you can actually be reporting hackers. Knowing how to catch a hacker with the right software is also available on the Internet (much of it is free), and it will allow you to track and get the necessary information. While the tools and programs that hackers use to get access to your computer and your information constantly get better, you need to know also that so is the software and protection that has recently become available to protect you from them. Remember that no program is foolproof, and that you will need to be continually getting some of the newest and latest protection, as well as keeping up with hacking protection news. Cyber hacking will continue as long as there are computers and money to be gained from them. New computer hacking laws are also continually being added to the books, along with the agencies needed to enforce those laws. But, it is your own diligence in keeping your computer protected that will help you most from becoming a victim of those cyber crimes.

61

Article 20

Intrusion Detection System Expert Advice on Keeping Your Network Safe by Blocking Dangerous Hacker Attacks The stories go on and on about another individual having their personal information stolen from their computer by some hacker. While it is true that hackers do get people's information, and they will keep on getting that information, it is also true that having intrusion detection software can help. And even better, to be hacker safe intrusion prevention system is by the same software.

Why You Need Intrusion Detection Doors can be opened to hackers in varied ways. Two of the most common ways by which they can gain access to your computer is simply through emails, or Web pages that you visit that have spyware, or trojans (a file which looks innocent, but actually will later open doors to a hacker) attached to them. Other ways are robot spiders sent out over the Internet to find unprotected computers, and open doors. Some say that every computer attached to the Internet may be attacked by such a spider as many as 50 times each day. So, if you do not have an intrusion prevention system in place, up-to-date, then you may have regular unexpected visitors - and you may not even know it. Others say that 9 out of 10 computers have some sort of spyware, or malware on them. Could you be one of them? This article will show you what is available on the market for your protection - and much of it can be obtained for free. The spider robots work automatically - looking for and identifying computers on the Internet that have doors, or ports, open to them. This information is then reported back to the hacker - knowing which computers to target - and which port to use. For this reason, every now and then, Microsoft will come out with a new patch for Windows, in order to close some faulty door that hackers have discovered and been using.

What Is Intrusion Detection? Network Intrusion detection software is a must-have these days. Each company's software will vary somewhat (for copyright and originality purposes), but you do need one for your own network, or home computer. It differs from a firewall in that the purpose of a firewall is to stop unauthorized external 62

contacts with your system. These offer hacker prevention largely for contacts from outside the network. Most of these will now notify the owner or network controller of intrusion attempts. Network intrusion detection systems, on the other hand, will give you warnings about events that take place within the network itself.

Be Hacker Safe Use Intrusion Detection Systems Although they are excellent in their design, having a basic firewall by itself is not sufficient to provide hacker prevention. Detection firewall intrusion often takes place after the fact. An important note here would be that a firewall cannot remove things that are already on your computer or network. If there was a virus before, or trojans, they will still be there afterwards. Which brings up another point - the first thing that needs to be done, before installing any firewall or intrusion detection software, is to remove all malware from the system by using a good scanner and removal software program. At the present time, there are a number of them that are free. It might be a good idea to run more than one - but be sure to disable the one you are not using. Experience shows that different software will detect different malware. When selecting your intrusion detection software, you need to know that there are basically two kinds. One is passive, meaning that an alarm will be sounded. A second kind is active, meaning that it will terminate the communication with the computer trying to obtain access, and it will notify the Webmaster. Intrusion detection software can also stop phishing emails, spam, and those pop-up ads. They can also prevent dial up hacker from invading your system.

What Is The Best Intrusion Detection System? Keeping your system hacker safe, and knowing how to prevent hackers from doing their dirty work is an ongoing task. It was mentioned in the beginning of the article that a determined hacker will get information. They are constantly upgrading their own methods, and the sad thing, is that much of the intrusion prevention development going on, only seeks to keep up with the methods the hackers use. The result - a hacker comes up with a new method, and he'll get in. One thing that is being reported as working quite well, especially for a Unix system (although there is also a Windows version, too), is an intrusion detection using Snort with wincap. This program has good reviews, and may be the software you need. Because of competition, new and better programs of detection and prevention are being developed all the time. Some systems have firewalls just for spam filters (great for email servers), and ones for general systems. There is even a new firewall system out there that is just for in-house IM communications. Of course, these new systems try to combine some of the features of a firewall and an intrusion detection system into one great package - and some of them can even 63

remove existing malware on your system! The best advice that could be given is to take this information and begin to do your own research into the latest products on intrusion prevention. At the same time you will want to find good malware removal software, and don't forget to consider downloading a trial version first. Some of these offer complete systems that can even be upgraded daily for the length of the trial period. Having your system protected by intrusion detection software is a great move, and will help to bring greater security to the information you want guarded the most.

Article 21

White Hat Hacking White Hat and Grey Hat Hacker – What is the Real Difference? Thanks to movies and books, our image of hackers has been distorted. What is worse, the public is not able to understand terms like grey hat, white hat, linux OS, or cracker. However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people. So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts. What Is A White Hat Hacker? According to Hollywood, a hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world. In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent ma chines so that kind of scenario is a bit dramatic. Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls. When computers appeared, this people found a new realm where they could exploit their skills. 64

Now they were not limited to the constraints of the physical world, instead, they could travel through the virtual world of computers. Before the internet, they used Bulletin Board Systems (BBS) to communicate and exchange information. However, the real explosion occurred when the Internet appeared. Today, anyone can become a hacker. Within that denomination, there are three types of hackers. The first one is the black hacker, also known as a cracker, someone who uses his computer knowledge in criminal activ ities in order to obtain personal benefits. A typical example is a person who exploits the weaknesses of the systems of a financial institution for making some money. On the other side is the white hat hacker. Although white hat hacking can be considered similar to a black hacker, there is an important difference. A white hacker does it with no criminal intention in mind. Companies around the world, who want to test their systems, contract white hackers. They will test how secure are their systems, and point any faults that they may found. If you want to become a hacker with a white hat, linux, a PC and an internet connection is all you need.

Grey Hat Hackers? A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers. For example, they may hack the computer network of a public agency, let us say, NOAA. That is 1

a federal crime. If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let us say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers. If you want to know more about hackers, then you can attend one of their annual conventions. Every year, hackers from all over the US, and from different parts of the world, reunite and meet at DEF CON. These conventions are much concurred. In the last one, 6,600 people attended it. Every year, DEF CON is celebrated at Las Vegas, Nevada. However, hackers are not the only ones who go to this event. There are also computer journalists, computer security professionals, lawyers, and employees of the federal government. The event is composed by tracks of different kind, all of them related, in some way, to the world of hackers (computer security, worms, viruses, new technologies, coding, etc). Besides the tracks, there are contests 65

that involve hacking computers, l ock picking and even robot related events. Ethical hacking, white hat hacking or whatever names you wish to use, at the end, it has a purpose: to protect the systems of organizations, public or private, around the world. After all, hackers can now be located anywhere, and they can be counted by the millions. Soon, concepts like white hat, linux operating system or grey hat will become common knowledge. A real proof of how much has our society been influenced by technology.

Article 22

Yahoo Hacking Programs Yahoo Hacking Programs - Are They Needed? There are many reasons that yahoo hacking programs might be useful in a family. Many times, those we love spend time online doing things we wish they would not be doing. Unfortunately, this is the state of the Internet. Often the only way to check up on them is to use yahoo password hacking programs to find their password and see what they have been doing online. There are free download yahoo hacking programs out there. Find out more about how to use free yahoo password hacking programs.

Why You Might Need To Use Hacking Software Hacking software should not be used for just any purpose. It is a serious invasion of privacy to read someone else's e-mail without their permission. Parents, on the other hand, need to know what their children are doing online. This is one situation when using yahoo hacking programs, or similar tools to get the passwords for AOL, Hotmail, or other free e-mail programs, might be needed. Protecting our children should be our number one priority, particularly with the rise of online predators preying on unsuspecting and innocent teenagers. Unfortunately, there are situations where a spouse might need to see what their husband or wife is doing on the Internet. Again, this should be a last resort after all attempts at discussion have been used. If, however, you suspect your spouse of using the Internet inappropriately, you can use free yahoo password hacking programs to gain access to Internet accounts. A final reason that some use these programs is to get into their own e-mail program when they forget their password. This really is not necessary, because most of the time when you contact the e-mail client, you can have your password resent with relatively little problems.

Be Careful Of Scams

66

There are many companies out there claiming to offer e-mail hacking services that are only trying to get access to your own private information. This is particularly true when trying to hack into your own email account. Make sure the company you are using will not have access to the passwords you retrieve.

Types Of Hacking Programs One type of hacking program is a key logger hacking program. This tracks the keystrokes on a computer, and often the password can be determined based on the pattern of keystrokes used. Another type of hacking program is a password recovery program. This will either reset your passwords, or reveal them to you, on your own personal computer. This is used not for e-mail programs, but for XP programs and other password protected devices on your computers.

Specific E-mail Password Hacking Programs Rainbowcrack is one of the popular yahoo hacking programs. This program uses brute force, which means it continually tries different password combinations until it finds the successful one. It might take a while, but it is usually able to find simple passwords on the major e-mail clients, provided the user knows the e-mail username. One of the more popular tools is John the Ripper. This program uses several different ways to find the password, including brute force. It also uses the dictionary to try to find the password. The Rixler Software Company makes several password hacking programs. These are not free, but they work on many different types of programs. This program is more sophisticated than you would need on Yahoo and other free e-mail clients. These are just some of the options out there to hack into e-mail programs. Keep in mind that when you see and advertisement for free yahoo password hacking programs, there may be a catch. You may be exposing your computer to spyware or viruses, so use the appropriate countermeasures. This is just one of the scams that are out there masquerading as hacking programs. Do not put your computer at risk! Considerations About Hacking Programs Before you head out and search for free download yahoo hacking programs, stop and think why you need it. What are you trying to find? Do you really need to find it? Think for an instant if the think you think your loved one is doing online is true. Do you really want to know? Will it help you in any way? If you positively need to get into someone else's e-mail, then consider yahoo hacking programs to enable you to do this.

67

Article 23

Game Hacking Hacking Rune Scape Accounts? No Fair Play! Thanks to the Internet, it isn't difficult to find hacking programs for Runescape. You won't have to spend days or months making a script in order to do so. You only need to find someone else who has done it, and who has published the program in his website. You may even find that they publish actualizations of their program! However, what is the purpose of hacking Runescape accounts? They do it for money, fame, or simply the desire to cause trouble to the company that makes this online game? And what is Runescape? There's a lot to learn about, so let's learn more about the background behind Runescape account hacking.

What Is Runescape? Runescape is a MMORPG. Due to its characteristics, it currently has nine million free players and more than 800,000 subscribers. However, why it is so popular? There are hundreds of single player games in the market, many of them free, and dozens of online games. Why does Runescape enjoy such an audience? The main reason why this game enjoys such popularity is that it is programmed in JAVA. That means that you can play it in any OS platform: Windows, Linux or even in MAC OS. The second most important motive is that it can run from any internet browser capable of using JAVA. That means that it won't consume your machines resources. The game takes place in the fantasy world of Gielinor, which is divided into several locations. People can travel through the game in different ways: by foot, through magical teleportation, or mechanical devices. Additionally, each region offers different quests and monsters. There is an additional issue, though. What is a MMORPG?

What Is A MMORPG? 68

MMORPG stands for Massive Multiplayer Online Role-Playing Game. There are many of these games now available, thanks to the appearance of the internet. Basically, it is a virtual world in which you can play a determined character and interact with other people located in different parts of the planet. The intention of the MMORPG is to acquire experience, or skills, in order to advance in the game. That way, your character acquires more knowledge and power, which can be used for acquiring better items and for fighting more difficult adversaries. In most of the cases, you need to pay a monthly fee for playing the game. The revenue of this industry is, approximately, of US$1.3 billion, and it is expected to triplicate by the year 2009. Most of the gamers come from the United States, South Korea and China. Although MMORPG may be considered something new, they are quite old (in computer terms), since they go back to the mid 1990's.

Why Do Hackers Target Runescape Accounts? Now that we understand more about the popularity of Massive Multiplayer Online Role-Playing Games, and especially the popularity of Runescape, it is obvious why so many people are interested in hacking Runescape accounts. However, what is the final intention of creating hacking programs for Runescape? Hackers are strange persons. Their motives can be varied, depending on their alignment. There are white hackers (people who hack computers for ethical reasons, e.g. help corporations with their security systems), black hackers (individuals who hack computers in order to obtain a benefit for themselves), and grey hackers (persons who walk a mid-line between white and black hackers, depending on their mood, or their need for money). So, they can do it for obtaining a personal benefit. For example, they may detect a Runescape character that has a high level and a lot of valuable items. They may hack it in order to steal them their belongings and use them for their own character. Of course, there is no court to appeal to. There isn't a legal frame that protects people from these kinds of acts. Yet. How Are Runescape Accounts Hacked? Hacking on Runescape can come from different sources. One of them is by the use of determined programs, for example, a Runescape file that has been tampered and hanged up in a download site. All the victims who download it can be the subjects of intrusion by a hacker. Spyware is another mean to hack your Runescape account. A specially designed program could be installed, without your knowledge, in your computer. This program will store in a file all the keys that you digit while using your PC. After determined amount of data has been collected, the program will send the info back to its creator. Simple but devious. How Can I Prevent Runescape Hacking? 69

Runescape hacking programs and Runescape hacking tools are easy to access. The question is how can you protect yourself? The first measure is to have your web browser, and your computer software, up to date. Security weaknesses can be exploited from almost any piece of software loaded by your computer.

Another step that you need to take is to assure yourself that you have installed a firewall, an anti-spyware program and an antivirus, running in real time. The lack of any of these three can be an open invitation for any hacker who wants to steal your character's equipment and treasure. Another important measure is to be careful from where do you download the game. Use only official sites. Avoid strange mirror sites or downloads from peer-to-peer file sharing programs like Kazaa, EMule or even BitTorrent. You may not know if the program was tampered or not. Unfortunately, hacking Runescape accounts isn't very difficult. All you need is some computer skills and a web browser in order to find the instructions for doing so. Or you can use one of the many hacking programs for Runescape that are available for free. So, be alert and beware of the numerous hackers that are lurking the web.

70

Article 24

Hacking culture Hackers and Culture? True Indeed! Hacker culture has existed for many decades, although the majority of us may have become recently aware thanks to movies like The Matrix. Nevertheless, hacking culture has been out there, and has been constantly influencing our society and the way we view the world. From anime to computer knowledge, hacker culture has, steadily, made its way to our lives. What Is Hacker Culture? Hacker culture is composed by all those experiences and human manifestations that are related to the exploit of hardware and software. Right now there are three kinds of hackers. The first and most known kind of hacker is the black hat hacker, or the individual who uses his knowledge for obtaining a personal benefit. Usually, it means stealing information that can be sold in the black market. The most daring black hat hackers are able to crack bank accounts, leaving no trace behind. Fortunately, bank security and worldwide cooperation has been able to place some restrictions and control over these individuals. On the other side of the balance is the white hack hacker, a computer security expert who works with organizations and helps them with their computer network security problems. Finally, there are the grey hat hackers. This kind of hackers is composed by people who walk the thin line between white hat hackers and black hat hackers. Usually, their tendency will be influenced by their need of money or their lust for recognition among the hacker community. Which Are The Origins Of Hacker Culture? It could be said that hackers have existed since immemorial times. Although the MerriamWebster dictionary portrays a hacker as a computer expert, in reality, a hacker is any person who looks for weaknesses in the system and tries to exploit them in their own benefit.

71

Under this definition, Philip II of Macedon, father of Alexander the Great, was a hacker. How so? He noticed that there were a series of weaknesses in the armies of ancient Greece. In order to exploit them in his favor, he decided to implement a series of improvements to his own army. As history has showed us, these improvements worked in his favor and in favor of his famous son.

The same could be said from Napoleon, who noticed that mobility and artillery could be used in such a way that no army in Europe would be able to withstand him. Unfortunately for him, he forgot to consider that logistics were an important thing to consider when he mobilized hundreds of thousands of men into the Russian Empire.

Know where you belong in the Hacker Culture However, it wasn't until the advent of the industrial revolution, and the appearance of the phone network, that the first hackers of the modern era appeared. In those days, the operators of this network were men. Unfortunately, many of them had a knack and a desire to exploit this system in their own benefit. Due to this fact, all men operators were fired and new, women operators were contracted (a practice that continued for many decades). The next revolution in hacker culture came with the appearance of the first computers in the universities around the country. Groups of students at the MIT were paid for developing the operating software of the giant computer mainframes. In order to make their work easier, these young men created hacks, or shortcuts, to determined sensitive areas of their programming. Are There Any Subcultures? In computer hacker culture there are two divisions. The first one is known as the Academic hacker subculture, composed by the students, engineers and professionals who had the ability to use the machines provided by universities. These people worked in computer science and had the latest in technology. Many of them were able to use their knowledge and expertise in the second division. The other hacker subculture is the one which has its origins in hobbyists; people who built computers in their garages (ala Steve Jobs and Steve Wozniak, the founders of Apple) or were quite good with electronics (many of the were subscribed to specialized magazines). This subculture had its first golden age with the advent of personal computers and the first computer games. Thousands of people across America looked for ways to hack computer game passwords and copyprotection schemes (in those days there was no internet, so the computer game companies weren't able to check online if your copy was an original). However, the true revolution came with the internet. 72

Now, hackers from around the world could hack, literally, millions of computers thanks to the weaknesses found at Microsoft Windows products and the lack of knowledge of computer users (only a small percentage makes constant software upgrades, and has a firewall, an antivirus and a spyware installed).

Finally, if you wish to learn hacking culture, or embrace it, start with some movies and literature! The Matrix is an excellent place to begin, but there are also excellent science fiction and non-fiction books that can transport you to a world you never imagined. One of the most popular ones is Neuromancer, written by William Gibson. For many, hacking culture has become their way of life. Bored with the standardized lifestyle of the western civilization, hackers and it millions of new followers have created their own niche among our technological society. Hacker culture, once considered part of the underground, is now part of us.

73

Article 25

Black Hat Hackers Black Hat Hackers Thanks to Hollywood, black hat hackers have become the iconic image of all hackers around the world. For the majority of computer users, the word hacker has become a synonym for social misfits and criminals. Of course, that is an injustice created by our own interpretation of the mass media, so it is important for us to learn what a hacker is and what a black hacker (or cracker) does. So, let's learn about black hat techniques and how they make our lives a little more difficult. What Is Black Hat Hacking? A black hat hacker, also known as a cracker or a dark side hacker (this last definition is a direct reference to the Star Wars movies and the dark side of the force), is someone who uses his skills with a criminal intent. Some examples are: cracking bank accounts in order to make transferences to their own accounts, stealing information to be sold in the black market, or attacking the computer network of an organization for money. Some famous cases of black hat hacking include Kevin Mitnick, who used his black hat hackers skills to enter the computers of organizations such as Nokia, Fujitsu, Motorola and Sun Microsystems (it must be mentioned that he is now a white hat hacker); Kevin Poulsen, who took control of all the phone lines in Los Angeles in order to win a radio contest (the prize was a Porsche 944 S2); and Vladimir Levin, which is the handle of the mastermind behind the stealing of $10'000,000 to Citigroup. Differences Between White Hat And A Black Hat Hacker The difference between black hat and white hat hackers is that white hat hacker uses their skills and knowledge as a way to defend someone from attackers. That means that white hat hackers offer their services to corporations, public organizations and educational institutions. These services include a complete revision of their computer network security, implementation of new security systems (they may be hardware or software), user training and future 74

recommendations. All these measures will be able to combat unauthorized hacking; black hat hackers, however, will continue trying.

How To Defeat The Attempts Of A Black Hat Hacker In order to survive in the World Wide Web, there are certain things that we need to know in order to endure. The first one is that each computer user is responsible for his machine and the data that it contains. It doesn't matter if a transnational spends hundreds of millions of dollars in IT security if an absent-minded employee downloads and installs unauthorized software or falls into the email scheme of black hat hackers. Basic Knowledge So, the first thing that we need to know is that computers, and networks, are like houses. If they don't have the windows and doors properly secured, anyone can enter. There are thousands of hackers in the internet looking for computers with unsecured entrances. Even worse, they have programs making the search for them. If you consider that there are hundreds of millions of computers in the world, then it is highly probable that an important percentage of them aren't properly secured. Firewall In order to secure our "house", we need to have a firewall installed and properly configured. A firewall is like a lock that assures that all the entrances to your computer are properly closed, so no one from the outside can access it. Anti Virus Software Another useful piece of software is the antivirus. Antivirus have been around since the first personal computers since viruses have always existed. Unfortunately, the internet has generated a demographic explosion and now they wander, freely, through the net. There are several software packages in the market, so test the ones with which you feel more comfortable and stay with the one that is more convenient for you. Regular Updates The next step is to update your operating system, especially if it is Windows XP. Ninety percent of the worldwide operating system market is owned by Microsoft. For that reason, it is the preferred choice for crackers in the entire world. They are constantly looking for ways to bypass the security of this operating system, looking for weaknesses of all kind (even in something as innocent as the Media Player). In order to stop them, maintain your operating system updated. 75

Education in Security Techniques Finally, if you are inside a company, assure yourself that the users are trained. They must be able to detect if they are being victims of cracker scam. It can be through the internet messaging system, an email or even an innocent looking PowerPoint attachment sent by a friend. People are the last line of defense against black hat hacking. Over time, black hat techniques have become more advanced and complex. Although there are computer software programs that can help a cracker in many ways, it is still a profession that requires a knack for computer software and hardware. So, as you may have noticed, black hat hackers will never disappear, which means that we need to have our computers, and our networks, prepared.

76

Article 26

Computer Hacking Prevention

Hacker Tricks And Prevention Techniques In movies or TV series where hackers are involved, we may have seen them apply their computer knowledge in order to perform certain hacker tricks that saved the day. From "The Matrix" to "Swordfish", hackers have been able to elevate themselves to the level of heroes with only a keyboard and a mouse. However, hackers attacks and hacker prevention is more difficulty, and complex, in real life. Hollywood has a tendency to oversimplify things so the general public can understand them. After all, only a small percentage of the population has enough skills to perform this kind of demonstrations. So, if you want to prevent hacking there are some basics that need to be learned first. Tricks And Techniques Employed By Hackers To Break Into Your System The first most common technique used technique used by hackers is scanning. Hackers have created tools that scan computers for weak spots. It can be an operating system that hasn't been upgraded or a port in the computer that it is open without the knowledge of the user. Hackers use this "open window" to get inside your computer in order to do whatever they want to do. The interesting thing about this is that these hacker tools are available for free in the Internet. So, with a couple of hours of instructions, almost every computer user can become a hacker. Another way that hackers can access your machine is through malware: programs designed to capture vital information from your computer, like login users and passwords. Malware could be hidden in a PowerPoint presentation sent by email or even in an innocent Instant Messenger message window. How To Prevent Hacker Attacks

77

Hackers are always looking for a way to get into computers of other persons. It can be something as simple as phising confidential information (like credit card or bank account numbers) to complex hacking routines that use your computer as a repository for illegal content (like music or movies with copyright).

Unfortunately there is no magical software to prevent hackers; and it will never exist. It doesn't matter how much money or resources you invest in designing the perfect system, someone will find the way to crack it. Even the biggest government agencies like NASA, CIA and NSA have been victims of hackers. And the same thing happens in the private sector with companies like Citigroup or Wal-Mart.

Effective Ways To Stop Hackers So, what can you do to protect your tiny machine from hacker tricks? Fortunately, there are some measures that we can take, and it doesn't require us to be a Neo or Hugh Jackman's character from the movie "Swordfish". These hacker protection tips are simple and effective and will defend you from most of the attacks. OS Updates The first thing to do in computer hacking prevention is to assure yourself that all your software is up to date; especially your operating system and your web browser. Why? Because they are the two things that hackers will try to attack first if they want to get into your computer.

Firewalling The second thing that you need to do is to install a firewall. As a matter of fact internet firewall hacker protection has become so necessary that Microsoft now ships it for free as part of their Windows XP operating system. It took them some years to admit it, but the truth is that their software was an easy target for the hackers and crackers that lurked through the World Wide Web. In case you don't want to use Windows XP firewall, there are many alternatives in the market. Companies like Symantec and Zone Labs have produced software firewalls for some time and have become a necessity for all the computers of corporate America. If you don't know which one you want to buy, use the trial periods. Usually you can use the firewall for 15 to 30 days; that amount of time is more than enough to make your decision. The next step in security is to have an antivirus installed. There are free versions like AVG antivirus, or pay per year licenses, like Norton Antivirus (also from Symantec). As in the case of firewalls, there are many varieties available in the market; use the trial periods for choosing wisely. 78

Anti Spyware/Adware Finally, there is the anti-spyware program. As if viruses were not enough, companies from around the world decided to create programs that could pick up data from your computer in order to acquire information for their databases. It may not be as dangerous as a virus, but it is an intrusion to your privacy. Wipe them out with this piece of software. Nowadays hacker prevention has become a task for all of us. No longer is it the responsibility of the system administrator of our company. After all, he can install all the security of the world in the company's network, but if you let a virus in because of your carelessness, he won't be able to stop it. The same goes for your computer at home. You are the only one responsible for it. Remember that new hacker tricks appear as each day goes by, so you need to be prepared.

79

Related Documents


More Documents from ""