What is hacking?
In the truest sense of the word, a "hacker" is a dedicated programming expert who believes in sharing his expertise and experiences with other hackers. A hacker does not believe in vandalizing or maliciously destroying data, or in stealing data of any kind. A "cracker" is a cyber burglar or vandal - an individual or group intent on causing malicious harm to a network or computer, or to steal information beneficial to themselves like passwords, credit card numbers and the like. For ease of use, the term "hacker" is used here to refer to either a hacker or cracker, as someone who enters or tries to enter your computer or network without authorization.
What kind of information can a hacker steal from my computer?
Personal information, names address, financial information, even the account information for your ISP and passwords, in short anything stored on your computer can be obtained by a hacker. A Trojan may record each and every keystroke you make, save the information to a hidden file, and automatically upload it to the hacker's computer.
What else can a hacker do?
There are a number of reasons why a hacker would want to break into your computer. He may use your computer and ISP account for illegal activity, like distributing child pornography. One of the most recent uses of Trojans is to cause DDoS (distributive denial of service) attacks. In a DDoS attack, the client commands all of the "servers" located on individual PCs to attack a single website. Thousands of individual PCs can be commanded to access a website like eBay or Yahoo at the same time, clogging the site's bandwidth and causing an interruption of service.
What can I do to protect my computer?
• Only download or accept files from reliable sources.
• Use a firewall to block unauthorized access to your computer.
• Install a good virus scanner program and update virus information files often
• Do not keep passwords, bank or financial account numbers, social security numbers or other personal and confidential information on your computer's hard drive.
Softwarez-unlimiteD
Sunday, September 19, 2010
Saturday, September 11, 2010
Use of Internet and Computers by Terrorists
Many terrorists are using virtual as well as physical storage media for
hiding information and records of their illicit business. They also use
emails and chat rooms to communicate with their counterparts around the globe.
The scenario
The suspects carry laptops wherein information relating to their activities is stored in encrypted and password protected form. They also create email accounts using fictitious details. In many cases, one email account is shared by many people. E.g. one terrorist composes an email and saves it in the draft folder. Another terrorist logs into the same account from another city / country and reads the saved email. He then composes his reply and saves it in the draft folder. The emails are not actually sent. This makes email tracking and tracing almost impossible. Terrorists also use physical storage media for hiding the information e.g. hard drives, floppies, USB drives, mobile phone memory cards, digital camera memory cards, CD ROMs, DVD ROMs, iPods etc. They also use virtual storage media for hiding the information e.g. email accounts, online briefcases, FTP sites, Gspace etc. The laws Terrorists are covered by conventional laws such as Indian Penal Code and special legislation relating to terrorism.
Who is liable?
Terrorists as well as those who help them to protect their information are liable. If email service providers do not assist the law enforcement personnel in the investigation then they are also legally liable. The motive Keeping terrorism related information confidential. Secure communication amongst terrorist group members.
hiding information and records of their illicit business. They also use
emails and chat rooms to communicate with their counterparts around the globe.
The scenario
The suspects carry laptops wherein information relating to their activities is stored in encrypted and password protected form. They also create email accounts using fictitious details. In many cases, one email account is shared by many people. E.g. one terrorist composes an email and saves it in the draft folder. Another terrorist logs into the same account from another city / country and reads the saved email. He then composes his reply and saves it in the draft folder. The emails are not actually sent. This makes email tracking and tracing almost impossible. Terrorists also use physical storage media for hiding the information e.g. hard drives, floppies, USB drives, mobile phone memory cards, digital camera memory cards, CD ROMs, DVD ROMs, iPods etc. They also use virtual storage media for hiding the information e.g. email accounts, online briefcases, FTP sites, Gspace etc. The laws Terrorists are covered by conventional laws such as Indian Penal Code and special legislation relating to terrorism.
Who is liable?
Terrorists as well as those who help them to protect their information are liable. If email service providers do not assist the law enforcement personnel in the investigation then they are also legally liable. The motive Keeping terrorism related information confidential. Secure communication amongst terrorist group members.
PhishinG
What is Phishing ?
With the tremendous increase in the use of online banking, online share trading and ecommerce, there has been a corresponding growth in the incidents of phishing being used to carry out financial frauds. Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details etc) by masquerading as a trusted entity.
What exactly happens in phishing ?
The victim receives an email that appears to have been sent from his bank. The email urges the victim to click on the link in the email. When the victim does so, he is taken to “a secure page on the bank’s website”. The victim believes the web page to be authentic and he enters his username, password and other information. In reality, the website is a fake and the victim’s information is stolen and misused.
Who is liable ?
All persons involved in creating and sending the fraudulent emails and creating and maintaining the fake website. The persons who misuse the stolen or “phished” information are also liable.
Erotic Dating Tips|Adult Dating
With the tremendous increase in the use of online banking, online share trading and ecommerce, there has been a corresponding growth in the incidents of phishing being used to carry out financial frauds. Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details etc) by masquerading as a trusted entity.
What exactly happens in phishing ?
The victim receives an email that appears to have been sent from his bank. The email urges the victim to click on the link in the email. When the victim does so, he is taken to “a secure page on the bank’s website”. The victim believes the web page to be authentic and he enters his username, password and other information. In reality, the website is a fake and the victim’s information is stolen and misused.
Who is liable ?
All persons involved in creating and sending the fraudulent emails and creating and maintaining the fake website. The persons who misuse the stolen or “phished” information are also liable.
Erotic Dating Tips|Adult Dating
Sunday, August 29, 2010
The-growing-cyber-crimE
The extraordinary development of information technology has obvious consequences for ''traditional'' organized crime. While the use of data processing systems and networks is undeniably a step forward for society, it also makes it more vulnerable.
Email Account Hacking
Emails are increasingly being used for social interaction, business Communication and online transactions. Most email account holders do not take basic precautions to protect their email account passwords. Cases of theft of email passwords and subsequent misuse of email accounts are becoming very common.
The scenarios
1. The victim’s email account password is stolen and the account is then misused for sending out malicious code (virus, worm, Trojan etc) to people in the victim’s address book. The recipients of these viruses believe that the email is coming from a known person and run the attachments. This infects their computers with the malicious code.
2. The victim’s email account password is stolen and the hacker tries to extort money from the victim. The victim is threatened that if he does not pay the money, the information contained in the emails will be misused. 3. The victim’s email account password is stolen and obscene emails are sent to people in the victim’s address book.
Email Account Hacking
Emails are increasingly being used for social interaction, business Communication and online transactions. Most email account holders do not take basic precautions to protect their email account passwords. Cases of theft of email passwords and subsequent misuse of email accounts are becoming very common.
The scenarios
1. The victim’s email account password is stolen and the account is then misused for sending out malicious code (virus, worm, Trojan etc) to people in the victim’s address book. The recipients of these viruses believe that the email is coming from a known person and run the attachments. This infects their computers with the malicious code.
2. The victim’s email account password is stolen and the hacker tries to extort money from the victim. The victim is threatened that if he does not pay the money, the information contained in the emails will be misused. 3. The victim’s email account password is stolen and obscene emails are sent to people in the victim’s address book.
Sunday, August 22, 2010
Software-piracY
What is Software Piracy ?
Software piracy is reproduction, distribution and use of software without permission of the owner of copyright. Piracy is the act of illegally copying and distributing commercial software. Software piracy can range from simply letting a friend "borrow" a CD-ROM to actually selling pirated software and passing it off as genuine. Software piracy (the illegal copying of software programs) is a worldwide problem, more than $11 billion is lost to piracy every year! Because software is valuable, and it is easy to create an exact copy of a program from a single computer, software piracy is widespread.
Effects of Software Piracy
when software is pirated, consumers, software developers, and resellers are harmed. Software piracy increases the risk consumer's computers will be corrupted by defective software and infected with viruses. Those who provide defective and illegal software do not tend to provide sales and technical support. Pirated software usually has inadequate documentation, which prevents consumers from enjoying the full benefits of the software package. In addition, consumers are unable to take advantage of technical support and product upgrades, which are typically available to legitimate registered users of the software. Pirated software can cost consumers lost time and more money.
Software piracy is reproduction, distribution and use of software without permission of the owner of copyright. Piracy is the act of illegally copying and distributing commercial software. Software piracy can range from simply letting a friend "borrow" a CD-ROM to actually selling pirated software and passing it off as genuine. Software piracy (the illegal copying of software programs) is a worldwide problem, more than $11 billion is lost to piracy every year! Because software is valuable, and it is easy to create an exact copy of a program from a single computer, software piracy is widespread.
Effects of Software Piracy
when software is pirated, consumers, software developers, and resellers are harmed. Software piracy increases the risk consumer's computers will be corrupted by defective software and infected with viruses. Those who provide defective and illegal software do not tend to provide sales and technical support. Pirated software usually has inadequate documentation, which prevents consumers from enjoying the full benefits of the software package. In addition, consumers are unable to take advantage of technical support and product upgrades, which are typically available to legitimate registered users of the software. Pirated software can cost consumers lost time and more money.
Tuesday, August 17, 2010
About-softwareZ
Computer software (or simply software) refers to one or more computer program and data held in the storage of a computer for some purpose. Software is the most common term used for different types of programs which are used for operation of computing devices. Software is divided into three major parts i.e.., system software (System software is computer software designed to operate the computer hardware and to provide and maintain a platform for running application software.), application software (application software is used to perform a singular or multiple related specific tasks. Some of the examples are word processors, spreadsheets, media players and database applications) and language processor (Any program whose sets of inputs and outputs each includes a program). Some of the examples of language processor are C, C++. Software can be purchased or can be downloaded as free trial. But nowadays almost all soft wares are downloadable over the internet from various web sites for public and official uses. Software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on an operating system. In Simple words you can say software is the way to perform different tasks electronically.
Subscribe to:
Comments (Atom)