Effect Of Hacking

Computer hacking uses a number of common tools to gain entrance to our system. Let's take a look at some of them...
  1. What Are The Effects Of Computer Hacking?... Port Scanners
    Computer cracking can involve port scanners -- an automated tool to systematically try to connect to every port on a computer.
    Port scans do have some legitimate uses, such as for testing our firewall security. However, hackers use them for scanning random blocks of Internet addresses looking for unprotected computers with unguarded ports.
    If our computer shows up in one of these scans -- because we have a poorly configured firewall or no firewall at all-- the malicious hacker may decide to enter our PC.
  2. What Are The Effects Of Computer Hacking?... Malicious Programs
    Hackers use backdoors -- such as Trojan horses and rootkits -- viruses, and worms to compromise our systems.
    Trojan horses are designed to appear to do one thing, such as a free game, but really do something malicious. They are often downloaded in a piece of freeware. A Trojan can be used to create a backdoor, allowing a hacker to gain access later.
    A rootkit is a piece of software that can be installed in a similar way to a Trojan and hidden on our computer without our knowledge.
    Rootkits are not necessarily malicious, but they may hide malicious activities. Attackers may be able to access information, monitor our actions, modify programs, or perform other functions on our computer without being detected.
    A virus is a self-replicating program that spreads copies of itself to other programs on the computer it has infected.
    A worm is also a self-replicating program, but it can spread copies of itself to other computers. It may carry a malicious program, such as a Trojan horse, which gives a hacker a backdoor entrance to our PC.
  3. What Are The Effects Of Computer Hacking?... Vulnerability Scanners
    Computer hacking can use vulnerability scanners to check a computer for security weaknesses, such as those common onWindows operating systems. When a vulnerability is found, the hacker knows exactly what to target to hack the system.
    Take, for example, a hacker armed with a laptop loaded with searching software and an omni-directional antenna. He/she can car-cruise down local neighborhoods and business parks to detect the locations of wireless network access points, or hotspots.
    The hacker will make note of the site, return at a later time, and hack into the network to search for vulnerabilities. This practice is known as "wardriving" or "drive-by hacking".
  4. What Are The Effects Of Computer Hacking?... Password Cracking or Sniffing Programs
    A password cracking program guesses users' passwords, whereas a sniffer program watches information passing through the Internet.
    The aim of using these computer hacking programs is to obtain usernames and passwords for unauthorized access.

Popular posts from this blog

1. HOW TO: Add a Dislike Option to Your Status Update

2. HOW TO: Hide Status Updates From Certain People

Google's search results for apps get a facelift