Uncategorized

Be Careful…

This slideshow requires JavaScript.

 

In the computer world, there are good guys who create networks that help us communicate, work with others and get information…and then there are those not-so-good guys and girls who, for a variety of reasons, like to use their computers to worm their way into those networks and cause trouble.

They’re called hackers, and they’ll routinely do things like:

  • Steal secrets.
  • Obtain passwords.
  • Get credit card information.
  • Create so much traffic that a website has to shut down.

Hackers are ALWAYS at work, either trying to steal information for their own gain or disrupt business as usual. You hear a lot of about hackers on the news now and then, but just what are they doing?

Here’s a bit of background to help you understand what it means when a website or company is “hacked.”

Hackers aren’t heroes.

For some reason, there are those who think that hackers are “cool” and that their spirit of mischief and sneaking is admirable. But the IT (Internet technology) experts who spend a lot of money building business or government networks would disagree. And, for that matter, so would anyone who has ever had their money or identity stolen by a hacker. There’s nothing playful about that.

Most people would agree that there are three types of hackers:

  1. Young kids “having fun.” These are adolescents who are essentially vandals on the Internet and are also know as Script Kiddies. They’re not looking for more than a few hours of their fun messing with websites or networks.
  2. Recreational “hackers.” These are savvy computer users who intrude on networks when they feel they have a valid reason to…in their minds at least. They may have a grudge against a certain website or company and take their dislike out by “hacking” or disrupting the website.
  3. Professionals. When a computer expert gets a taste of hacking and likes the flavor, he or she will continue to use their skill, often for breaking into people’s accounts to steal money. They also might like taking down a big network for “fun.”

Stealing passwords and getting in the system.

Finding out a password is the usually the first step in cracking a network’s security. (That’s why there are so many articles telling you to change your passwords often and make them hard to figure out!)

Here are a few key terms that you’ll hear in discussions about hackers and what they do:

  • Back door. A secret pathway a hacker uses to gain entry to a computer system.
  • Buffer overflow. A method of attack where the hacker delivers malicious commands to a system by overrunning an application buffer.
  • Denial-of-service attack. An attack designed to cripple the victim’s system by preventing it from handling its normal traffic, usually by flooding it with false traffic.
  • Email worm. A virus-laden script or mini-program sent to an unsuspecting victim through a normal-looking email message.
  • Root access. The highest level of access (and most desired by serious hackers) to a computer system, which can give them complete control over the system.
  • Root kit. A set of tools used by an intruder to expand and disguise his control of the system.
  • Script kiddie. A young or unsophisticated hacker who uses base hacker tools to try to act like a real hacker.
  • Session hijacking. When a hacker is able to insert malicious data packets right into an actual data transmission over the Internet connection.
  • Trojan horse. A seemingly helpful program that tricks the computer user into opening it, only to deliver (unnoticed and behind the scenes) an unexpected attack on the user’s computer.

Keeping safe.

You can protect yourself simply by creating passwords that are hard to predict, by using different passwords for different accounts, and by changing passwords every so often.

These steps help to prevent you from being an “easy” target.

Advertisements
Blogs

Part-3 (Hacking Well)

 

  1. Image titled 441133 8

    1.   Write open-source software

    Write programs that other hackers think are fun or useful, and give the program sources away to the whole hacker culture to use. Hackerdom’s most revered demigods are people who have written large, capable programs that met a widespread need and given them away so that now everyone uses them.

  2. Image titled 441133 9

    2.   Help test and debug open-source software

     Any open-source author who’s thinking will tell you that good beta-testers (who know how to describe symptoms, localize problems well, can tolerate bugs in a quickie release, and are willing to apply a few simple diagnostic routines) are worth their weight in rubies.

    • Try to find a program under development that you’re interested in and be a good beta-tester. There’s a natural progression from helping test programs to helping debug them to helping modify them. You’ll learn a lot this way, and generate goodwill with people who will help you later on.

  3. Image titled 441133 10

    3.    Publish useful information

    Another good thing is to collect and filter useful and interesting information into web pages or documents like Frequently Asked Questions (FAQ) lists, and make those available. Maintainers of major technical FAQs get almost as much respect as open-source authors.

  4. Image titled 441133 11

    4.   Help keeps the infrastructure working

    Volunteers run the hacker culture (and the engineering development of the Internet, for that matter). There’s a lot of necessary but unglamorous work that needs to be done to keep it going — administering mailing lists, moderating newsgroups, maintaining large software archive sites, developing RFCs and other technical standards. People who do this sort of thing well get a lot of respect, because everybody knows these jobs are huge time sinks and not as much fun as playing with code. Doing them shows dedication.

  5. Image titled 441133 12

    5. Serve the hacker culture itself, which is not something you’ll be positioned to do until you’ve been around for a while and become well-known for one of the four previous items

    . The hacker culture doesn’t have leaders, exactly, but it does have culture heroes and tribal elders and historians and spokespeople. When you’ve been in the trenches long enough, you may grow into one of these.

    • Hackers distrust blatant ego in their tribal elders, so visibly reaching for this kind of fame is dangerous. Rather than striving for it, you have to position yourself, so it drops in your lap, and then be modest and gracious about your status.