Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Computers connected via the internet are vulnerable to hackers, who can use cunning tricks to gain access

to them or even take them over. There are various methods used for hacking, some are briefly described. PASSWORD CRACKING Serious hackers use password-cracker software that runs through all the possible combinations of numbers and letters until it finds the right one. GETTING INSIDE YOUR COMPUTER A Trojan Horse is a file that looks harmless until opened, but once open it installs a rogue program that takes control of the computer. Key logging is a method of linking up to someone elses computer and monitoring every key that is presseduseful for gaining passwords or other security information. Programs designed to scan for weaknesses in a computers firewall (protection) systems are called vulnerability scanners. Computer worms infect networks by sending copies of themselves to all the machines in the system. A virus is a computer program that infects a host program and alters the way it works. HIDDEN IDENTITY OF HACKERS Hackers can use IP spoofing software to conceal their true identity online. Hackers use this software to get through security systems.

COUNTERMEASURES There are a few things you can do to stay secure from network hacking attempts. Keep all your software up to date. Implement a firewall. This will keep most of the bad data out and good data in. Install anti-virus software. Scan your system with a vulnerability scanner. This may reveal possible vulnerabilities in your system.

Thank You!

You might also like