Error opening template: advertisement/zones/468x60_generic.tplError opening template: advertisement/zones/728x90_leaderboard.tplError opening template: advertisement/zones/728x90_bottom_ad.tplError opening template: advertisement/zones/300x250_right_ros_up.tplError opening template: advertisement/zones/300x250_right_ros_down.tplError opening template: advertisement/zones/160x600_left_nav.tplError opening template: advertisement/zones/160x600_right_nav.tpl How Hackers Get Into to Your PC

How Hackers Get Into to Your PC

Hackers are very sophisticated in computer programming and have an endless amount of ways of bypassing a firewall to access a network and a PC. Regardless of antivirus updates, a hacker can still find a way around the newest upgrades on antivirus programs and firewalls.

If you understand the process hackers use to illegally access networks and PCs, it may help you to figure out more ways that you can work to protect your network system and your PC.

Scan for Vulnerable Systems

If you are using a regular modem to establish an Internet connection, a hacker can use what is known as a demon dialer to access your connection. This sneaky little device redials thousand of phone numbers until it locates an open connection.

If you are using a cable connection (DSL) the hacker can use a program that scans the IP address of your Internet connection or network to verify if the system is currently running. They can also use programs that spy on the information that is being transmitted from one device to another by using a "sniffing" program.

  • Vulnerable IP Lists: Once hackers identify what computers and networks are vulnerable, they exchange lists of these addresses with fellow hackers so a trojan can be loaded into the PC with the intention of snooping, spying, or destroying your computer's operating system. They additionally use a tool that system administrators use to test the security strength of a network system. The tool identifies vulnerabilities and provides the hacker with a list of exploits.

  • Get Root: Once the hacker has accessed the network and gotten into the PC, the next step is to take over the PC operations. This is accomplished through computer programming commands that assist with searching the PC for the administrator password. After locating the password the hacker creates his own user account that is undetectable by the PC user and gains access to the programs and files on the PC.

This is one of the most common ways that hackers can access a network and a PC. With all of the different ways that they can get access it almost seems like your information and data will never be safe. This is true in the respect that with the ever changing world of technology new vulnerabilities arise with new computing systems.

There are a few things you can do to reduce the chances of a hacker intruding on your network and PC. In addition to implementing a solid antivirus program armed with a spyware, phishing, and adware detector you can also add a few other security components that will protect some of the vulnerabilities not covered by your antivirus program. These include an intrusion detection system and the latest security patches which will patch up any vulnerabilities or holes that currently exist in your network or PC's operating system.

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.

With the advent of wireless Internet, more and more computer users are entering the world of cyber space.

Yet, while these users are well aware of the importance of the protection of their computer when hooked up to regular internet providers, they are often oblivious to the fact that the same cyber dangers, and in fact even more, exist in the world of WiFi.

What you may not know is that same Internet connection that makes it possible to check your email from the comfort of your bed also makes it easier for hackers to access your personal information.

It is for this reason, the sharing of the wireless Internet connection, that protecting your computer when wireless is even more important than ever before.