Translate To:
[code via DI]
Flash Updates
Making Of
Tips Tricks Hacks
Fantastic FREEBIES
Hacking Tips To Be Safe
Get Back 'Folder Options'
Capture Screenshots In Windows Media Player
Best Anti Virus
Checking Processor Speed
Computer Keeps Restarting
Orkut Scraps As RSS
Cheapest Data Recovery
Easy Fast Uploading
Convert Video Formats
Hidden Tool In XP
Secure Your Network
Notepad Alternative
Google Tips
Search Google Without Ads
Google Advanced Search
Hidden Google Pages
10 Google Myths
FREE Stuff Via Google
FREE Torrent Files Via Google
Firefox & IE Tweaks
Fullscreen in Firefox
20 Firefox Extensions
Preview Tabs In Firefox
Firefox Search Result In New Tab
Run Google Talk In Firefox Sidebar
Speed Up Internet In FireFox
Increase Number Of Simultaneous Downloads In IE7
Vulnerabilities Found
Use Google Video To Hack Password
YouTube Could Be Used To Hack Computer
Yahoo Messenger 8.0+ Vulnerability
A Note About
Reviewed
Hacking - The Must Learn Tips To Be Safe
This Article Is Sponored By You! | Friday, May 11, 2007 by Salman Siddiqui | CommentsI am now blogging on my self hosted blog CompuWorld and started another blog of mine the Senorita
Tip 1: Hackers cover their tracks. Experienced hackers cover them more thoroughly, but amateur hackers sometimes leave things behind. Don't expect them to leave any really big evidence behind; expect more of little things here and there you might find surprising. For example, if you're writing a term paper and a black hat hacker accidentally saved it when he took a paragraph out- that's suspicious. Where did that paragraph go? Well, for one thing, now you know he was in that area. Check the folders surrounding the file- you might find something.
Tip 2: Decipher between the type of hackers that are attacking you. Experienced hackers will have a more in depth look around when they penetrate your system. They won't touch much because they know that that won't add too much to their knowledge. But if you know a hacker's been in, and some files are messed with, and you have a log of someone guessing passwords to a file or something of that sort, its probably some newbie who's just starting out. These are the easiest hackers to catch. They usually get so caught up in thoughts like "I'm in!" that they forget the basics, such as work behind a proxy.
Real Life ExampleTip 3: Don't go crazy if you lose data. Chances are, if it was that important, you would have backed it up anyway. Most hackers nowadays wish they were back in 1989 when they could use a Black Box and having a Rainbow Book actually meant something. Most hackers aren't blackhat, they are whitehat, and some even greyhat. But in the end, most hackers that are in systems aren't satisfied by looking around. From past experiences, I have concluded that many hackers like to remember where have they been. So, what do they do? They either press delete here and there, or copy some files onto their systems. Stupid hackers (yes, there are plenty of stupid hackers) send files to e-mail addresses. Some free email companies will give you the IP of a certain e-mail address's user if you can prove that user has been notoriously hacking you. But most of the time, by the time you get the e-mail ID it's been unused for weeks if not months or years, and services like hotmail have already deleted it
My friend was setting up a webserver once. His first time too, and he wasn't to anxious to set up some good software to protect against hackers and viruses. He didn't put up one IDS, and before you know it, the obvious happened. But this time, a newbie had struck. The nice log files showed, bluntly across the screen, multiple instances of a foreign IP address that stood out. Some stupid newbie had tried to login as "uucp" on my friend's XP computer, with a password of "uucp." Well, that's great, but he also had tried the same user/pass combination three times, enough to get himself logged nicely. Even a semi-brainless user with some form of neurological system knows that uucp isn't a default XP account. Again, excitement toiled this hacker's brain, and maybe if he hadn't done that, along with a few other stupid things, he wouldn't have gotten caught. What other things did he do? Well, lets see. He opened 35 instances of MS-DOS. He tried to clean the printer's heads, and he edited a .gif in notepad. Then he uninstalled a few programs and installed some html editor, and replaced four files with the words "14P." he might as well have posted his phone number. In a few days, we had tracked him down to suburban town in Ohio. We let him go, not pressing any charges, because he had done nothing really damaging and had provided me with an example of a moron for this guide.
Tip 4: Save information! Any information that you get from a log file (proxy server IP, things like "14P", e-mail addresses that things were sent to, etc.) should be saved to a floppy disk (they're not floppy anymore, I wish I could get out of the habit of calling them that) in case there's a next time. If you get another attack, from the same proxy, or with similar e-mail addresses (e.g: one says Blackjack 123@something.whatever and the other says Black_jack_45@something.znn.com) you can make an assumption that these hackers are the same people. In that case, it would probably be worth the effort to resolve the IP using the proxy and do a traceroute. Pressing charges is recommended if this is a repeat offender.
Tip 5: Don't be stupid. If you've been hacked, take security to the next level. Hackers do talk about people they've hacked and they do post IPs and e-mail addresses. Proof? Take a look at Defcon Conventions. I've never gone to one, but I've seen the photos. The "Wall of Shame"-type of boards I've seen have IPs and e-mail addresses written all over them in fat red, dry-erase ink. Don't be the one to go searching the Defcon website and find your e-mail address posted on the Wall of Shame board!
Tip 6: Don't rely on luck. Chances are, sometime or another, you're going to be targeted for an attack. Here you can rely on luck. Maybe they'll forget? Maybe they don't know how to do it? If you think this way, a surprise is going to hit your face very hard. Another way you could stupidly rely on luck is by saying this: It's probably just a whitehat. On the contrary, my friend, it's probably just a blackhat. A blackhat with knowledge stored in his head, ready to be used as an ax. It's your data. You take the chance.
Try these links to learn some of the terms which were too goofy for your ears...
White Hat Hacker
Black Hat Hacker
Grey Hat Hacker
Traceroute
Get more CompuWorld tips, tricks and hacks and Subscribe to CompuWorld by Email to receive latest ones.
[hacking tips article via Computer and Sofwares]
Labels: tips tricks and hacks
==========Your Comments==========
>>>>>>>Click Here To Leave Your Precious Comments.<<<<<<<
==========Your Comments==========
>>>>>>>Click Here To Leave Your Precious Comments.<<<<<<<
“This Article”
Centrino Duo (AKA Santa Rosa) Explained - Posted on Thursday, May 10, 2007
Checking for TCP/IP Connection Problems in Windows... - Posted on Wednesday, May 9, 2007
Post 100: Why I Blog? - Posted on Tuesday, May 8, 2007
Run Google Talk Gadget In Firefox Sidebar - Posted on Monday, May 7, 2007
Wikipedia Criticizing Itself - Posted on Monday, May 7, 2007
How To Download Free Torrent Files Using Google - Posted on Saturday, May 5, 2007
India Aims For $10 Laptop - Posted on Saturday, May 5, 2007
Checking Processor Speed - Posted on Friday, May 4, 2007
YouTube Starts Paying Its Users - Posted on Friday, May 4, 2007
Wave Your Hand To Adjust The Speaker Volume - Posted on Wednesday, May 2, 2007
Moved
I am now blogging on my self hosted blog CompuWorld and started another blog of mine the Senorita
Money Makers
Get Paid For Blogging..Yess! Stumble & Earn
JobThread
GoalGuru
BlogsVertise
ReviewMe!
Copeac
BidVertiser
AdBrite