Paper
How to Shield Your Computer from Internet Crime
When you connect to the Internet, you are allowing you computer to communicate with millions of people who are also on the Internet. Suddenly, your hard drive is fair game. Some people called by various names: hackers, whackers, crackers, and some other more colorful names if your data is being destroyed. These people make it their business to find and make use of exposed hard drives. Sometimes, they just take an innocent look around; sometimes they delete files or even deposit a virus of nature. However, hope is not lost, with the steps outline in this paper you will be able effectively shield your computer from those who wish to make mischief.
When you connect to the Internet, especially through a broadband connection any open ports, or shared file files and services are like a beacon for hackers’ automatic scanners. You see, along with granting you extremely fast downloads and browsing capabilities broadband connection also leave you computer wide open to the world since it an always-on connection. The risk is greater for those people that have static IP address. Since this address never changes hackers can come back whenever they wish.
One way to see how vulnerable your computer is would be to have it tested by one the various websites that specialize in security. One very good website is hosted by the Gibson Research Corporation and has several helpful feature like “Shields Up”, the address for this site is www.grc. Another popular site with many useful utilities would be www.dslreports. If these sites show you some holes in your security they will recommend several actions. One of the easiest and most effective would be to turn off file and print sharing for your computer. The second thing you could do would be to obtain a personal firewall. In this area you have two options, hardware or software. If you want an inexpensive route then you can download a software firewall.
Firewall? Just what is that? Well, it either a software program of hardware device that effectively blocks outsiders from entering your computer. Software firewalls just need to be installed onto your computer and can be either automatically configured of manually. Hardware involves connecting your computer into another device. Two of the more popular software firewalls are Zone Alarm (www.zonelabs) and Norton Personal Firewall (www.symantec). Using Zone Alarm, the above sites could find no exposed ports or even that this computer even was on; Zone Alarm completely cloaks your computer.
Before I go further, the motives and history if the hacker should be discussed. It usually begins with contempt; most virus writers and hackers feel left out of mainstream society. They are usually at least mildly smart, but don’t want to get a regular job. They sometimes want to be famous, or to at least be recognized. Money, however, is not the motivation in most cases. Hackers often complain that information should be free. However, one cannot purchase groceries for free. If someone generates useful information they usually expect to be able to feed and house themselves because of their effort. The hacker theory of free information also ignores the huge amount of work that preceded the hackers’ access to the Internet and computers. All to often, a hacker is the intellectual version of those spray-painting teens. Feeling powerless, they can at least break into someone else’s computer; leave a mark of some kind, thus, letting the world know that they exist. Of course, you cannot stereotype a whole group of people with a single portrait. I’m sure that not all hackers are socially inept and nerdy; there are undoubtedly handsome, popular, athletic hackers. Perhaps, one or two. When these hackers grow up, those that are actually talented often join the other side. They end up working for the government of business that they once despised. Kevin Mitenick, probably one of the most famous hackers recently testified before congress. Large corporations have hired hackers as security specialists. Some hackers have even banded together to form security consultant companies.
Perhaps you have heard that there is a distinction drawn between the merely curious (the true hacker) and the destructive (the black hats, whacker or cracker). This distinction is a bit self-serving, there is however some truth to it. A pure hacker is only interested in decryption, seeing if they can breach security, or learning all that they can about networks and systems. The just watch, never do any harm to the subject. This definition fits many people, in fact it a pretty good description of anyone who is interested in learning. However, the media and the public ignore this distinction. To be fair, hackers do not always stay pure.
So what exactly is the distinction between hackers? There are sub categories within the hacker community, defined by how they apply the hacker ethic. The hackers who seek only to break into systems and see what information is there and do no damage, and whose primary goal is to ensure the freedom of information are called samurai. Whackers are defined as would-be hackers who merely investigate systems, without attempting to create security breaches. Crackers are hackers who for lack of a better word have gone over to the dark side. Crackers are interested in actually stealing information, and doing damage. Crackers are look down on by hackers, because they give hacking a bad name. Though some are clever, most are just persistent and use the code of others to the work for them.
Now for the interesting part, just how exactly does a hacker gain access to your system? The first step involves getting a password. One way that this can be accomplished is with a password-harvesting virus. A hacker merely sends the virus onto someone’s network, which then attaches itself to the networks logon procedure and then sends the information back to the hacker. This information is of course sent to bogus e-mail or a newsgroup where the hacker is waiting to snatch it up. There are numerous ways to cloak your e-mail and create ghost accounts but that is beyond the scope of this paper. It is only important to know that it can be done. One of the programs used by hackers is called a “mockingbird”. This is a small program that automatically intercepts name/password combinations as they are entered and send them back to the hacker. Another method may arise from some consultation work. While working on site the hacking may create a back door. Having done this he has a way to access the network and full access to everything he wants. Also, while on site the hacker may spy a yellow sticky note on someone’s computer with his or her password written on it. One clever method of obtaining password is called “spoofing”. The hacker sends e-mail to someone claiming to be a boss, or more often, a worker in the IT department. The hacker asks the user to type in their password and send it so it can be authenticated. This works better than one might think; most people are trained to polite and responsive to their superiors.
However, for every hacker trying to break in, there is a system administrator on the other side trying to build walls strong enough to keep data secure. One method companies use to fight back against hackers is known as bait and trace. There are several other names that are interchangeable, most notable being: iron box and Venus flytrap. These are all names for special traps set up to catch a cracker who is logging in over a remote connection. The idea is to provide the cracker with limited access to your network and also offer interesting information (known as bait files) to keep the user on the system long enough to be traced. An iron box is sometimes made up of an imitation operating system, a false shell that appears to be complete, but restricts the intruder in ways that are not easily noticed. Bait files are often included in the false shell. Sometimes an iron box is set to intercept certain types of behavior, ID’s or passwords. The whole idea is to detect, then delay the intruder. A business may also hire a security firm to monitor their network.
So, what topics have been discussed? Vulnerabilities and how to detect them, the motives and history of a hacker, the classification hackers sub groups, how a hacker infiltrates a computer or network, and measures that can be taken to stop them. As a result, we can now be more adequately prepared and more aware of what can be done to us and what we do about it. Remember, knowledge is indeed power.
Другие работы по теме:
Crimes With Computers Essay Research Paper Computer
Crimes With Computers Essay, Research Paper Computer Crime Technology experienced a break-through with the invention of computers. With this break-through came a new quest for knowledge and power. Society relies more and more on computers each day and people have found that a quest for knowledge or power on a computer could give them more than they bargained for.
Misuse Of Computers
– Hackers Essay, Research Paper In every advance that civilization has made there have been the dishonest and the greedy who quickly learn how to take advantage of the new breakthroughs. The new world of computer technology is no exception. As many people see it, alongside the brilliant programmers came hackers.
Computer Education Essay Research Paper Back to
Computer Education Essay, Research Paper Back to the 1940s, the modern electronic computer was developed at U.S. universities; however, in the year, there was no computer education yet. It needed more 10 years to have computer education. The period of the computer revolution was 1950 in the U.S.. Computer education began in the middle of the 1950s with an organized body of knowledge.
School Violence Essay Research Paper I went
School Violence Essay, Research Paper I went up to a college this summer to look around, see if it was where I wanted to go and whatnot. The guide asked me about my interests, and when I
Crime Essay Research Paper In today s
Crime Essay, Research Paper In today s society computers are everywhere, but when someone thinks of a computer they think of it as a way to make life easier. This is true computers have made our life a lot easier and some times harder. The area that computer have improved our life the most is in communication, now we can write talk and hold a video conference anywhere in the world in real time.
Hacking Essay Research Paper Imagine this you
Hacking Essay, Research Paper Imagine this, you are driving along the road and suddenly you see something spectacular. Now imagine that you are not allowed to deviate from your course to
Computer Essay Research Paper Computer is useful
Computer Essay, Research Paper Computer is useful for finding the information. As long as the Internet is installed in the computer, the people can be able to what they want to find. Of course, they have to waste the time for doing. Acquiring the information, they feel that it is valuable. Renctly years, the number of people is increased by using computer.
Hackers Manifesto Essay Research Paper Hackers ManifestoAnother
Hackers Manifesto Essay, Research Paper Hackers ManifestoAnother one got caught today, it’s all over the papers. “Teenager Arrestedin Computer Crime Scandal”, “Hacker Arrested after Bank Tampering”… Damn kids. They’re all alike. But did you, in your three-piece psychology and 1950’s technobrain, evertake a look behind the eyes of the hacker? Did you ever wonder what madehim tick, what forces shaped him, what may have molded him?I am a hacker, enter my world… Mine is a world that begins with school…I’m smarter than most of the other kids, this crap they teach us bores me… Damn underachiever.
What Really Is A Hacker Essay Research
Paper What Really is a Hacker? Dan Parks Julie Jackson – Instructor CIS 101 11-18-96 There is a common misconception among the general public about what constitutes a hacker and what hacking is. Hacking is defined as “gaining
Computer Hacking Essay Research Paper As the
Computer Hacking Essay, Research Paper As the world becomes more and more reliant on computers the computer hacking industry is greatly rising. With people such as Kevin Mitnick, who is known as a “computer
Hacker Culture Essay Research Paper Hacker Culture
Hacker Culture Essay, Research Paper Hacker Culture What are hackers? Webster’s Dictionary defines a hacker as an expert at programming and solving problems with a computer; or a person who illegally gains access to and sometimes tampers with information in a computer system. (Webster’s) There is a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers.
Getting Paid To Hack Essay Research Paper
GETTING PAID TO HACK Hackers can get paid to hack codes. Hackers have to be careful on what jobs to take. If hackers break the law, they have to be imprisoned. But there are legal hacks.
Computer Hackers Essay Research Paper The meaning
Computer Hackers Essay, Research Paper The meaning of Hacker is one who accesses a computer which is supposably not able to be accessed to non authorised people of the community. Hackers may use any type of system to access this information
Hackers Essay Research Paper A Hacker
Hackers Essay, Research Paper A Hacker A hacker is a person obsessed with computers.At the heart of the obsession is a drive master thecomputer. The classic hacker was simply acompulsive programmer. It is only recently that theterm hacker became associated with the computerizedvandalism.Great description of Hackers:Bright young men of disheveled apperance,Often withsunken, glowing eyes.Seen sitting at computerconsoles, their arms tense and waitingTo fire theirfingers which are already posed to strike at thebuttons and keys on which their attention seems todice.They work until they nearly drop,twenty orthirty hours at a time if possible.They sleep oncots near the computer,but only a few hours-thenback to the console, or printouts.Their crumpledclothes, their unwashed, unsheven faces, anduncombed hair, testify that they are oblivious to
Untitled Essay Research Paper A hacker is
Untitled Essay, Research Paper A hacker is a person obsessed with computers. At the heart of the obsession is a drive master the computer. The classic hacker was simply a
Another Computer Essay Essay Research Paper The
Another Computer Essay Essay, Research Paper The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence
Computerized World Essay Research Paper A Computerized
Computerized World Essay, Research Paper A Computerized World Since the first computer was made in the late fifties, the technology has developed extremely. Computers which took the place of a living-room then, are now being made in credit card-formats. More and more areas are being taken over by the computer.
Do Hackers Perform A Service Essay Research
Paper David Danforth Seminar paper 02/16/01 Do ‘Hackers’ Provide a service or are they Criminals? Today the media paint a mixed picture for the public concerning the role hacker’s play in our society. On the one hand they praise the skill hackers display when breaking into secure networks and wreaking havoc with clever viruses.
Computer Net Crime Essay Research Paper Computer
Computer Net Crime Essay, Research Paper Computer crimes are terrorism of the present day. Everything from Website attacks, viruses, and cyber sex. People have even been charged for rape over the internet. Government computers have been an easy target for hackers for decades. According to Defense Information Systems Agency s data, the military may have experienced about 250,000 attacks in 1995 with 2/3 s of the intrusions being successful.
Another Hole In The Wall Essay Research
Paper ANOTHER HOLE IN THE WALL Opinion: This was a very interesting article because it seems that everybody That owns a computer has the fear of hackers and viruses. It’s a big issue
Hackers Essay Research Paper In the article
Hackers Essay, Research Paper In the article that I read was about Hackers. It talked about the aspects of how the youths of today commit this crime. Hacking overall requires the utmost intelligent. These people that become Hackers have special knowledge and skills in computer programming, Internet use, overwhelmingly bright in mathematics and other important factors.
Essay On Hacking Essay Research Paper Essay
Essay On Hacking Essay, Research Paper Essay On Hacking by Philip Smith A topic that i know very well is computers and computer hacking. Computers seem very complicated and very hard to learn, but, if given time a
Landscaping Essay Research Paper Computer Hacking BasicsComputer
Landscaping Essay, Research Paper Computer Hacking Basics Computer hacking is very popular. With every thing on the Internet having to cost something. Someone will try to hack that database and retrieve free information. As every on knows but doesn?t take very seriously is that hacking is illegal. Hacking is anywhere from hacking in to the school data base and change your grades to make a stop light change with a special clicker.
Hacking Essay Research Paper Hacking has been
Hacking Essay, Research Paper Hacking has been developed over the years to be unstoppable. Newcomers to the hacking community learn the rules by associating with established hackers. Hackers like to hack in order to impress each other.
Hacking Essay Research Paper There are two
Hacking Essay, Research Paper There are two different worlds of computer enthusiasts, that of hacking and of cracking. Hacking is the pursuit to further one s knowledge of a system, usually a computer. Hackers (see appendix) are generally much smarter then your average person and try to further the limits of a system through their understanding.
Modernization Of Computers Essay Research Paper Since
Modernization Of Computers Essay, Research Paper Since the first computer was made in the late fifties, the technology has developed extremely. Computers which took the place of a living-room then, are now being made in creditcard-formats. More and more areas are being taken overby the computer.As computers are capable of handling large amounts of data in a very shorttime, they are well suited for wordprocessing.
Computer Crime 3 Essay Research Paper Ever
Computer Crime 3 Essay, Research Paper Ever since I got my first computer. I have enjoyed working on them. I have learned a tremendous amount of trouble shooting. With my recent computer I have come across computer crime. I got interested in hacking, prhreaking, and salami slicing. But before I go to far, I need to learn more about it like the consequences? One question in mind is what crimes are their and what kind of things you can do with them? I would like to find out why people do thesis things? I would also like to learn the laws against all computer crime?
Computer Essay Research Paper Computer Crime By
Computer Essay, Research Paper Computer Crime By: John Sforza Sforza-1 John Sforza Miss. Hilleman English 10R December 7, 1999 Computer Crime Computer crime is defined as “a criminal act that has been committed With a computer as the principle tool”(Judson, 30). These computer criminals are people with advanced knowledge of operating systems, phone systems, and other computer related devices.
Computer Crimes Essay Research Paper Computer CrimeComputer
Computer Crimes Essay, Research Paper Computer Crime Computer crime is a very broad term. It could mean anything from a total invasion by a hacker into the federal government or just the simple fact of one person letting another borrow a copy of his favorite flying game. Computers are defined in the dictionary as a machine that computes (WBD vol. 23).
The Computer Mouse Essay Research Paper The
The Computer Mouse Essay, Research Paper The Computer Mouse The computer mouse is a common pointing device, popularized by its inclusion as standard equipment with the Apple Macintosh. With the rise in
Argumentative Essay Research Paper Computer HackersWhat is
Argumentative Essay, Research Paper Computer Hackers What is a computer hacker? A hacker is a computer aficionado, a modern day Robin Hood, or an educated thug who breaks in to corporate and government computer systems using their home computer and a telephone modem. Despite this flurry of attention, their everyday life and social world remains largely unknown.
Computer Violence Essay Research Paper Violent Computer
Computer Violence Essay, Research Paper Violent Computer Games A lot of adults say violent computer games make you violent. I disagree. When you are mad you can take out your anger while playing that game. Lots of kids I know have violent computer games and none of them are violent. Pretty much everything in this world has violence in it.