The government released the two since there were no laws punishing authors of malicious software in the country at the time. However, the government must yet learn from its oversight for the Congress has yet to pass an Anti-Cyber Crime Law that will properly address inimical cyber crimes. However, as technology evolves, the techniques or tools used by crackers and the purpose of their acts have also evolved. This paper will first look at what is hacking and will discuss the difference between ethical and unethical hacking.
Maybe your antivirus software has inexplicably been disabled, or the speed of your computer has slowed to a crawl. Worse than just a pesky virus, an attack on your system directed by a hacker can be far more damaging and costly.
Many users believe they are too small a target to be attacked by hackers. Previously, cybercriminals may have agreed with that assessment, but that is quickly changing. Once hackers gain access to your system, a number of frightening scenarios can take place.
Using sophisticated and well-planned methods, they have been known to hold data hostage, engage in identity theftand even use your computer to launch attacks on other networks.
The best way to combat these cybercriminals is to understand how they carry out their attacks. Basic computer security awareness and a bit of common sense in your day-to-day online activities is generally enough to avoid becoming victims.
However, these deceptions are not the only tricks of modern-day hackers. Here are several other high-tech ways your computer can be exposed: Trojans A Trojan is malware disguised as harmless software, named after the wooden horse the ancient Greeks used to trick their way into the city of Troy.
Once installed on your computer, a Trojan can do anything from logging your keystrokes, to opening a backdoor and giving the hacker access to your system. There are several ways in which a Trojan can infect your personal computer. The most common infection vector hackers use is to trick you into Hacking piracy and virus creation on a file or email attachment.
Often, these attachments can come to you by way of a friend whose account has already been compromised, making you believe the contents are from a trustworthy source. Other times the hacker may try to scare you into opening the attachment, making it seem like it is an official notice from the IRS, FBI, or your bank.
Clicking on a malicious link on Facebook or other social media sites can allow a hacker to inject a Trojan into your personal computer.
Even though these sites take security seriously and are as vigilant as possible, there have been instances when Trojans have infected users this way.
A rather dated but good example of this was the infected site known as LyricsDomain. A drive-by download exploits exposed security flaws in your web browser, operating system, or other software that has not been recently updated or patched.
Unfortunately, the download and installation of the malware is invisible to the victim. Also, there is no way to tell whether a website is infected just by looking at it. If you suspect that a site poses a possible threat to your computer, check a blacklist of malicious websites before navigating to the homepage.
As a result, this form of attack has been on the rise and will only continue to get worse unless computer users take the proper precautions. Updating your software and using the latest version of your favorite web browser is a good start since it will close any newly discovered security holes these infected sites can exploit.
Rootkits A rootkit is not exactly malware like a virus or Trojan. It is something much more insidious: Since rootkits grant administrative control to the attacker, your computer can be used without restrictions and without your knowledge. A rootkit can attack and replace important operating system files, allowing it to hide or disguise itself and other malware.
When rootkits invade this part of your system, it makes even operating system reinstallation or disk replacement an ineffective strategy to neutralize the rootkit infection. Many of the worst, most destructive kinds of malware use rootkit technology.
Since rootkits can infect different areas and different files, it is very difficult for even moderately experienced users to deal with them. Unfortunately, you will not even know whether you have this type of malware since it is designed to hide itself so effectively.
That is why avoiding questionable sites, diligently updating your antivirus software, avoiding dubious email attachments, and generally protecting your system is a good way to make sure you never fall victim to this type of ingeniously malicious infection.
What Hackers Do Once Access to Your Computer Is Gained The techniques and technologies outlined above are some of the most effective tools modern hackers have at their disposal.
Even the untalented, semi-technical hacker is not just trying to be a nuisance. The vast majority are criminals with one goal in mind: Here are a few things the hacker may do upon gaining access to your computer. The infecting malware is called a bot program, and a variety of combinations and techniques can be used to get it onto the target system.
Quite often, it is delivered as a Trojan, activated by clicking a malicious email attachment or link, and remains hidden from the user because it has built-in rootkit technology.
The main objective of the hacker in this sort of attack is to make the compromised computer part of a robot network or botnet. Botnets have a tremendous amount of processing power with sometimes up to hundreds of thousands of zombies worldwide. Trap Your Computer in a Botnet Once your computer becomes part of a botnet, the bot herder can use it in a number of ways.cracking and virus creation Software piracy.
Access Access to computing technology Access to data Accuracy Accuracy of information stored Hacking. The information which is viable and being accessed is now much more accurate &authenticate. Hacking, Piracy and Virus Creation “In this era of computer advancements and technological breakthroughs Hackers, Computer Pirates and Virus Creators while there actions are similar there motives can differ, Shamus Ford reports.”.
Computer Hacking Methods & Examples of Cyber Criminals – Protect Yourself. By Arto Baltayan Posted in: Technology. Worse than just a pesky virus, an attack on your system directed by a hacker can be far more damaging and costly. Thousands of bloggers incorporated it into the creation of their blogs, thus creating almost , Article shared by. Hacking was a term that originated in s and is associated with the unauthorized use of computer and network resources. By definition, hacking is the practice of altering the features of a system, to accomplish a goal which is not in scope of the purpose of its creation. cracking and virus creation Software piracy. Access Access to computing technology Access to data Accuracy Accuracy of information stored Hacking. The information which is viable and being accessed is now much more accurate &authenticate.
The Impact of Software on People and Society. These harmful aspects of computers and software have triggered new laws and new subindustries that provide virus protection, hacking insurance, and other forms of protection. These inventions have also led to the creation of new and special cybercrime units in all major police forces, the FBI.
grupobittia.com is a blog related to Computer Security and not a site that promotes hacking/cracking/software piracy. 3. This site is totally meant for providing information on “Computer Security”, “Computer Programming” and other related topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
Hacking may not be the first thing you think of when you hear the movie Office Space, but hacking is actually a key part of the film.
In between hating their job, employees embezzle fraction of cents by planting a virus in the company’s accounting system. Sep 09, · Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.