Sunday, September 19, 2010

HackinG

What is hacking?
In the truest sense of the word, a "hacker" is a dedicated programming expert who believes in sharing his expertise and experiences with other hackers. A hacker does not believe in vandalizing or maliciously destroying data, or in stealing data of any kind. A "cracker" is a cyber burglar or vandal - an individual or group intent on causing malicious harm to a network or computer, or to steal information beneficial to themselves like passwords, credit card numbers and the like. For ease of use, the term "hacker" is used here to refer to either a hacker or cracker, as someone who enters or tries to enter your computer or network without authorization.

What kind of information can a hacker steal from my computer?
Personal information, names address, financial information, even the account information for your ISP and passwords, in short anything stored on your computer can be obtained by a hacker. A Trojan may record each and every keystroke you make, save the information to a hidden file, and automatically upload it to the hacker's computer.

What else can a hacker do?
There are a number of reasons why a hacker would want to break into your computer. He may use your computer and ISP account for illegal activity, like distributing child pornography. One of the most recent uses of Trojans is to cause DDoS (distributive denial of service) attacks. In a DDoS attack, the client commands all of the "servers" located on individual PCs to attack a single website. Thousands of individual PCs can be commanded to access a website like eBay or Yahoo at the same time, clogging the site's bandwidth and causing an interruption of service.

What can I do to protect my computer?
• Only download or accept files from reliable sources.
• Use a firewall to block unauthorized access to your computer.
• Install a good virus scanner program and update virus information files often
• Do not keep passwords, bank or financial account numbers, social security numbers or other personal and confidential information on your computer's hard drive.

Saturday, September 11, 2010

Use of Internet and Computers by Terrorists

Many terrorists are using virtual as well as physical storage media for
hiding information and records of their illicit business. They also use
emails and chat rooms to communicate with their counterparts around the globe.

The scenario
The suspects carry laptops wherein information relating to their activities is stored in encrypted and password protected form. They also create email accounts using fictitious details. In many cases, one email account is shared by many people. E.g. one terrorist composes an email and saves it in the draft folder. Another terrorist logs into the same account from another city / country and reads the saved email. He then composes his reply and saves it in the draft folder. The emails are not actually sent. This makes email tracking and tracing almost impossible. Terrorists also use physical storage media for hiding the information e.g. hard drives, floppies, USB drives, mobile phone memory cards, digital camera memory cards, CD ROMs, DVD ROMs, iPods etc. They also use virtual storage media for hiding the information e.g. email accounts, online briefcases, FTP sites, Gspace etc. The laws Terrorists are covered by conventional laws such as Indian Penal Code and special legislation relating to terrorism.

Who is liable?
Terrorists as well as those who help them to protect their information are liable. If email service providers do not assist the law enforcement personnel in the investigation then they are also legally liable. The motive Keeping terrorism related information confidential. Secure communication amongst terrorist group members.

PhishinG

What is Phishing ?

With the tremendous increase in the use of online banking, online share trading and ecommerce, there has been a corresponding growth in the incidents of phishing being used to carry out financial frauds. Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details etc) by masquerading as a trusted entity.

What exactly happens in phishing ?

The victim receives an email that appears to have been sent from his bank. The email urges the victim to click on the link in the email. When the victim does so, he is taken to “a secure page on the bank’s website”. The victim believes the web page to be authentic and he enters his username, password and other information. In reality, the website is a fake and the victim’s information is stolen and misused.

Who is liable ?

All persons involved in creating and sending the fraudulent emails and creating and maintaining the fake website. The persons who misuse the stolen or “phished” information are also liable.
Erotic Dating Tips|Adult Dating