Help! There's an Intruder in my Computer By June Campbell |
Once in, they can use your private information any way they see fit. As well as getting your personal documents, the hacker can damage your system files or install software on your disk that allows your computer to be used in Denial of Service attacks and other destructive activities.
OVERTURE APPROVED BID MANAGEMENT SERVICE
Let ClickPatrol save you time & money and earn better results. Maintain top PPC placements on Yahoo!, AOL, MSN, and AltaVista, and others. All through one easy-to-use interface! |
Similarly, the hacker can activate your interior microphone or interior video recorder without your knowledge. This
lets them record and distribute sound and video files of the conversations and activities taking place in your work
area.
How Hackers Do It
Every Internet-connected computer has a unique set of identifying numbers called an IP address. Using special software applications, hackers send out probes over the Internet looking for live IP addresses. If they locate your computer, they look for "holes" or vulnerabilities that leave your system insecure.
For example, a computer is likely to have multiple applications (email, web browser, etc.) running on the same IP address. Each application is assigned a number called a "port" that uniquely identifies that service on a computer.
Ports that allow an application to send or receive information from the Net must be "open". In some unprotected systems, even ports that are not in use have been left open -- practically inviting attack! When hackers discover an unprotected, open port, they can use that opening to gain access to your system.
An unprotected broadband connection is easiest to hack because both the connection and the IP address remain constant. If a hacker or a "script kiddie" finds your computer once, they can readily find it again. (Script kiddie is a derogatory name used by professional hackers to describe simple scripts used by young and inexperienced hackers).
The threat is less severe for persons connecting to the Internet via dial-up modems. Dial-ups usually connect with a different IP address each log-on. Therefore, if hackers have found a system once, the changing IP address will make it difficult (not impossible) to find it again.
However, if a trojan horse or back door program has been installed on a system, the trojan horse could "phone home" with the IP address each time an Internet connection is made.
Back door programs allow remote users to control a system without the owner's knowledge. They are installed on computers by hackers, or sometimes come secretly bundled with software applications that the user installs. Well-known back door programs for Windows computers include Back Oriface, NetBus and SubSeven.
Find the Right Consultants For Any Project - FAST! Sign Up for a FREE Membership Today ProSavvy empowers you to efficiently and effectively identify, select and manage consultants, thereby dramatically reducing the time and risks involved in obtaining consulting services. ProSavvy has pre-qualified 1,900+ consulting firms, enabling you to quickly find consultants from every practice area. |
Firewalls: Your First Level of Security
Firewalls are software applications or hardware devices that you install on your system. They are designed to prevent unauthorized access to or from a private network that is connected to the Internet. When a firewall is installed, all incoming or outgoing messages pass through the firewall. Those that do not meet the specified security criteria are blocked.
Most home firewalls are software applications.
How Firewalls Work
There are various types of firewalls, and they work through different processes. However, the following is true for most of the home or personal firewall software that is used today.
Information over the Internet is sent in "packets" of data. These packets travel from a source machine to a destination machine -- which could be two feet away or two continents away. Each packet of data contains the IP address and port number of the originating machine.
The firewall software inspects every packet of data that arrives at the computer -- BEFORE that data is allowed entry into the system and before it connects with an "open" port. The beauty of a firewall lies in its ability to be selective about what it accepts and what it blocks. The firewall has the ability to refuse any suspect data. If the incoming data is ignored and not allowed in, that port will effectively disappear on the Internet and hackers cannot find it or connect through it. In other words, instead of receiving a signal that a port is open, the hackers receive nothing back and have no way of connecting.
Several firewall applications are available to the small business operator or the home computer user. Before changing firewalls or installing one for the first time, it's wise to check out the comparative testing that has been done on these applications.
Persons already running a firewall could test it's effectiveness by trying the Shields and Ports test available at Gibson's Research Corporation (GRC) web site, or by downloading and running the LeakTest software available on the site .
GRC's Steve Gibson has some surprising test results posted in conjunction with LeakTest's personal firewall scoreboard .
The best-rated one is free. Not only did Zone Lab's Zone Alarm score best in Gibson's testing, but the firewall has been recognized for excellence by CNET, PC World, PC Magazine and Home Office Computing .
Other well-known firewalls include McAfee firewall, Sygate Personal FW, Symantec/Norton and Tiny Personal FW.
Now, the bad news. A firewall protects you from open ports, but it does not protect you from data coming and going through ports that you allow. Malicious code can invade your system from email attachments or by visiting a hostile web site. And remember -- even well trusted web sites can suddenly be hostile if hackers have added malicious code without the site administrator's knowledge.
Test your security against malicious code at Finjan Software's web site. Many of you will be dismayed to find that your supposedly secure system is vulnerable.
Malicious code blocking software such as Finjan's Surf n' Guard analyzes incoming data and decides whether the code could be harmful. ZDNet recommends that code-blocking software be used in addition to firewall and your antivirus software.
Too Late?
What if you think you've been hacked? Call your computer guru to help, or check out the information at sites like HackFix.
About The Author
How to Write Business Plans, Business Proposals, JV Contracts, Human Resource Package, and More!
No-cost ebook "Beginners Guide to Ecommerce". Business Writing by
Nightcats Multimedia Productions