Security informational articles

Hacked: who else is using your computer? - confidence

 

A associate called me one day and asked if I would stop by to look at his computer. He said it was in succession abnormally slow and he had found a touch on his hard-drive he could not explain. I could approximately guess what it was he found. Have I been hacked?

You see, his laptop had been hacked. Actually, in his case, his cpu had been tagged. Analogous to the image you see here.

Tag, You're It!
---------------
The file convey protocol, regularly referred to as "FTP", has been about for many years. In the early days of the Internet, it was one of the few ways to by far upload and download files from one laptop to another. Many commercial in use systems come with an FTP ma?tre d' installed. In other cases, the opportunity for FTP army is selected by a user when they are installing or updating their in use system. If this assistance is not setup properly, or you don't have an adequately configured software or hardware firewall, it is an open call for a hacker or intruder.

FTP Cataloging - The most collective end for a big cheese to compromise your FTP ma?tre d'h?tel is for the cargo space and distribution of illegally obtained software and files. This could consist of cracked software, stolen movies, audio files, and pornography. Removing this type of illegal imports from your computer can be difficult, chiefly if you are using a Microsoft Windows platform. Hackers use clever scripts to build a maze of address list structures to house their wares on your computer. They may use a amalgamation of names with places in them, and in some cases use comprehensive characters (characters external the customary alpha-numeric range). Deleting these directories by means of common means may be difficult, if not impossible, for the arithmetic mean user. Many people wind up wiping their classification and re-installing it, and that is if they're lucky a sufficient amount to find out their coordination has been compromised.

The above is a absolute case in point of why the statement, "I'm not concerned about being hacked. What do I have that a hacker would want?" is not a good arrange to take. The fact is, you do have a touch they want, your computers resources. Why must a hacker store tons of illegally obtained files on their systems when they can use yours.

The Good, The Bad, And The Ugly
-------------------------------

The Good
--------
When I was young I use to spend hours upon hours on the Internet Relay Chat, also know as the IRC. The IRC is another fashion of Internet communication, which has been around for quite a long time. When I was a go to regularly user of the IRC, it was just plain fun. You would meet all kinds of people from all over the world. It was the immediate envoy of the time.

The Bad
-------
Today, the IRC is a huge broadcasting network. It is made up of thousands of channels, and can be accessed by cute much any in use classification platform. It is also a darling means of announcement for hackers. They can confer new exploits, methods of compromise, and even send and accept files. Many hacker groups use a cryptic dialect to communicate with each other on the IRC channels. But for you know the dialect constructs they use, their conversations can look like a bunch of nonsense.

There are many exploits, backdoors, and Trojans that effect, or are limited in, the countless of IRC clients on the Internet. Construction sure you elect one that's more or less safe to use is not an easy task. As an example, take a look at this list of IRC shelter and collateral info at irc. org.

The Ugly
--------
It's not just the exploits and defense risks connected with using the IRC, which need to alarm you. If a hacker is able to establish an IRC relay agent on your computer, it can develop into a agent by means of which they commune and distribute information. In my line of work, I've identified many systems with IRC backdoors or relay agents installed. The only thing the end user typically experiences is a decrease in coordination act and Internet access.

Just Open The Door And Let Them In Peer-to-Peer File Distribution
----------------------------------
If a total stranger were to knock on your door, and ask to come in to just hang out for awhile, would you let them in?; Most expected not. If you're using peer-to-peer file division software to locate and download files on the Internet, you're breach the door to destruction. Many of the file sharing air force and software free on the Internet now tout themselves as being "safe" and "clean". This is as far from the truth as you can get. If you're a conventional user of these services, the accidental of your laptop being back-doored or hacked is significant.

If you have anti-virus software installed (and up-to-date), you've undoubtedly acknowledged communication a propos viruses when downloading files from peer-to-peer services. These are not the only effects you could be downloading. Many hackers imbed root-kits in files and circulate them using peer-to-peer file sharing. Root kits be full of many types of tools used by hackers to gain charge over computers. If the installation of the kit on your laptop goes hidden and is successful, it's only a affair of time ahead of your central processing unit is finally compromised.

I can't tell you how many times I've found business employees (and expert personnel) using peer-to-peer file sharing services. Any association that permits this is putting itself at risk. And, the risk is much larger as compared to a definite home cpu as of the amount of potential domestic targets.

Conclusion
----------
Of course, the above is just a few examples of assorted methods and types of central processing unit compromise. There are many ways your central processing unit can be hacked. Your best excuse is a good crime along with instruction and awareness. When you configure your central processing unit make sure you facilitate only the software and air force that you need. Many programs have known exploits and / or call for further steps be taken to adequately assured them.

Don't make the best guess that you are not a aim at just because you don't think you have something of appeal on your computer.

If our mainframe becomes unstable or dramatically decreases in performance, don't affect it's just a quirk or that it's time to upgrade.

Make sure you have a software or hardware firewall in place to defend you from the Internet. Your firewall must be configured not to allow indistinctive inbound approach from the Internet. This is the defaulting configuration for most firewalls, but you must make sure the one you are using is properly configured.

Make sure you have passable virus and spyware protection, and your configuration signatures are up-to-date. Many anti-virus applications work on a subscription basis. It's not uncommon to find out your subscription expired. If it is expired, your software may not keep you from new and emerging threats.

And, do what ever you can to stay away from any type of Internet peer-to-peer file allotment service. No affair how safe the developer claims it is.

About The Author
----------------
Darren Miller is an In order Defense Consultant with over sixteen years experience. He has in black and white many technology & collateral articles, some of which have been in print in nationally circulated magazines & periodicals. Darren is a staff essayist for http://www. defendingthenet. com and more than a few other e-zines. If you would like to commerce Darren you can e-mail him at Darren. Miller@ParaLogic. Net or DefendTheNet@ParaLogic. Net.

If you would like to know more about laptop guarantee delight visit us at our website. If a big shot you know has sent you this article, desire take a instant to visit our site and register for the free newsletter at Newsletter Subscribe.

Original URL
------------
http://www. defendingthenet. com/NewsLetters/HaveYouBeenHacked. htm


MORE RESOURCES:








The Case for a National Security Budget  Foreign Affairs Magazine




























































































Developed by:
home | site map
goldenarticles.net © 2019