Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Recent Updates
[November 08, 2024, 04:31:03 PM]

[November 08, 2024, 04:31:03 PM]

[November 08, 2024, 04:31:03 PM]

[November 08, 2024, 04:31:03 PM]

[November 08, 2024, 04:31:03 PM]

[October 17, 2024, 05:05:06 PM]

[October 17, 2024, 04:53:18 PM]

[October 17, 2024, 04:53:18 PM]

[October 17, 2024, 04:53:18 PM]

[October 17, 2024, 04:53:18 PM]

[September 09, 2024, 12:27:25 PM]

[September 09, 2024, 12:27:25 PM]

[September 09, 2024, 12:27:25 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   MegaPixelShop
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Ethical Hacking / Security / Viruses » Viruses
  Who's Peering Into Your Computer?
Pages: [1]   Go Down
  Print  
Author Topic: Who's Peering Into Your Computer?  (Read 1117 times)
Daniel Franklin
TWI Hero
**********


Karma: 3
Offline Offline

Posts: 16647


View Profile Email
Who's Peering Into Your Computer?
« Posted: October 02, 2007, 01:49:04 PM »


Have any passwords, love letters, naughty pictures or sensitive business information stored on your hard drive? It's almost embarrassingly easy for a hacker to break into a networked computer and retrieve your personal information.

Does your computer have an interior microphone or an interior video recorder? If yes, these technologies can be activated without your knowledge. Hackers can not only get your data files, but they can record sound and video files of the conversations and activities taking place in your work area.

Almost everyone knows the importance of protecting their system against viruses. My anti-virus software knocks off at least 3-4 viruses every week. And most people with a direct Internet connection (i.e. cable, ADSL) know the importance of installing firewall software. My excellent (and free) Zone Alarm firewall (www.zonelabs.com/) protects me from hacks coming through open computer ports.

But recently I learned about a third threat -- the potential danger of malicious codes coming in through ports that I must leave open in order to access the Internet. Hostile ActiveX codes, Java codes and Windows scrap objects can be buried in Rich Text email, embedded in documents, hidden in games and electronic postcards, or downloaded from web sites.


It's a safe bet that no responsible webmaster has knowingly placed hostile code on the site. However, many sites are vulnerable to attacks from hackers, and hackers have no such scruples. Imagine logging on to your favorite sports site and unknowingly downloading hostile code that damages your operating system, installs software that allows third parties to use your computer for denial of service attacks, or makes your personal data available to prying eyes. For full information, refer to an article recently published on ZDNET. http://www.zdnet.com/anchordesk/stories/story/0,10738,2764074,00.html

To discover whether your system is vulnerable, visit Finjan web site and try their three online tests. They'll check your system for vulnerability to hacks from malicious ActiveX, Java and Windows scrap objects. I was shocked to discover that Finjan's code was able to hack my system easily and quickly. As proof, it created a desktop folder and named it You Have Been Hacked. The folder contained a sampling of Word documents found on my hard drive and a ten-second .wav recording of the sounds in my workstation. Scary. This information, and more, would have been readily available to anyone who wanted to hack in. Needless to say, I installed Finjan's free SurfinGuard Pro software for protection. I'd recommend any Windows users try these tests. You might be glad you did (http://www.finjan.com/).

Interested in knowing just how much information a skilled hacker could get from your machine? Check out this web site called Beyond Enemy Lines: http://belps.freewebsites.com

The webmaster, Man in the Wilderness (MITW), claims to be an Internet security expert. MITW is apparently a "white hat" hacker who uses his skills to protect his customers from attack.

As the story goes, the head of a professional spamming operation repeatedly forged MITW's domain for spamming purposes. (Professional spammers typically hide their identities by using forged domains.) Finally, in retaliation, MITW hacked the spammer's computer and published his findings on this web site. The details make fascinating reading.

After breaking into this woman's system, our white-hat hacker obtained and published screen captures of spam software while it was using his forged domain name to send thousands of emails. MITW also obtained copies of email messages discussing various spam operations, ICQ message logs and much more. Similarly, he found and published semi-nude pictures of the woman and her colleagues and samples of erotic writing found on the computer.

Some might say that this woman deserved what happened to her. Perhaps she did. If the content on the site is true, she was involved in some particularly nasty activities. However, the real message is just how vulnerable our computers can be to hackers if we aren't more than a little careful.

This woman and her cohorts were running a professional spamming operation. You might think they, of all people, would have protected themselves against hackers. But they did not. Perhaps, like me, they thought they were protected. Remember that my computer was vulnerable in the Finjan testing, despite running up-to-the minute virus software and a firewall that is rated as one of the best.

How about you? Could you stand up to a hacker attack? Protecting a computer is now a three- pronged fork. We need anti-virus software, firewalls and malicious code blocking software.

Articles Source - Free Articles

About the Author

June Campbell Writing Services by Nightcats Multimedia Productions -- FREE eBook, "Beginner's Guide to Ecommerce" -- Newsletter, business articles, email marketing course -- How-to guides for business proposals, business plans, -- JV contracts, brochure designs http://www.nightcats.com

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.116 seconds with 24 queries.