Question:
How do computer hackers access your computer?
Veronica
2007-10-27 12:48:21 UTC
How do computer hackers access your computer?
Five answers:
Larry J
2007-10-27 12:54:32 UTC
There are several recurring tools of the trade used by computer criminals and security experts:

Security exploit

A prepared application that takes advantage of a known weakness.

Vulnerability scanner

A tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and it's version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)

Packet sniffer

An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

Spoofing attack

A spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

Rootkit

A toolkit for hiding the fact that a computer's security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Root kits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.

Social engineering

Convincing other people to provide some form of information about a system, often under false premises. A blatant example would be asking someone for their password or account possibly over a beer or by posing as someone else. A more subtle example would be asking for promotional material or technical references about a company's systems, possibly posing as a journalist.

Trojan horse

These are programs designed so that they seem to do or be one thing, such as a legitimate software, but actually are or do another. They are not necessarily malicious programs. A trojan horse can be used to set up a back door in a computer system so that the intruder can return later and gain access. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called trojan horses. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.) See also Dialer.

Virus

A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.

Worm

Like a virus, a worm is also a self-replicating program. The difference between a virus and a worm is that a worm does not create multiple copies of itself on one system: it propagates through computer networks. After the comparison between computer viruses and biological viruses, the obvious comparison here is to a bacterium. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program. It is possible for a program to have the blunt characteristics of both a worm and a virus.
footyfan_stoke
2007-10-27 12:56:19 UTC
Like I'm gonna train another one of you, lol!



There are a lot of entrances into your computer, hence the name "Windows" lol!
anup
2016-10-03 02:26:57 UTC
first of all, IP addresses are infrequently secret. till you utilize a VPN, each internet site you bypass to is conscious of your IP tackle. regardless of in case you utilize VPN, you IP tackle continues to be completely guessable. parent there are approximately 3 billion IP tackle finished. Your ISP possibly makes use of under one hundred,000 those. additionally they possibly difficulty the IP addresses by ability of region. So if somebody is conscious of the place you reside and what carrier carrier you utilize, they only could desire to guess by way of approximately sixteen,000 or so IP addresses earlier they discover you. maximum hackers even with the undeniable fact that, do no longer care who you're. they only span in the time of each and each of the IP addresses they are able to attain and examine out customary secure practices holes. regrettably i can't discover the merchandise proper now, yet I bear in ideas analyzing one final 12 months, that mentioned the consumer-friendly time to the 1st attack as quickly as gadget is plugged into the community is under quarter-hour. So it ability in case you in basic terms set up an old version of residing house windows and plug your gadget into the community, you may assume interior half-hour or so, your gadget has been broken into. the way they destroy in is in basic terms utilising secure practices holes interior the working gadget and amenities. working example, could desire to desktops respond to ping requests. There are customary exploits on some desktops the place in case you deliver a corrupt ping request, the workstation will manage component to the packet as a application to run... Your maximum suitable defence is stable secure practices application. additionally on condition that maximum assaults are under residing house windows, you're extra proper defended in case you consumer Linux or Mac OS X. i in my view propose Fedora, as SELinux makes it an exceptionally perplexing version of Linux to compromise. Now, as quickly as
anonymous
2007-10-27 12:52:58 UTC
Through any of the "backdoors" left there by Microsoft!
tasty
2007-10-27 13:04:06 UTC
http://en.wikipedia.org/wiki/Hacker_(computer_security)


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...