What you need to know about protecting yourself from hackers


What a hacker?

"Hacker" is a terminology that has a different meaning depending on who uses it. Thanks to Hollywood, most people think that an intruder is someone who gets illegal access to a computer, steals things or breaks into military networks and launches missiles for fun.

These days, the hacker should not be obsessed with a major university storming banks and government regulations. Pirates can be anyone, even the next door child.

With any regular laptop, anyone can download a simple program from the Internet to see everything that comes in and out of a computer on the same network. And the people who do it don't always have the best intentions.

A brief history of pirates

Nowadays, the word "hacker" has become a synonym for people sitting in dark rooms, terrorizing the Internet anonymously. But it was not always so. The original hackers were benign creatures. In fact, they were students.

For anyone who attends MIT during the 1950s and 1960s, the term "breakout" simply means an elegant solution or an inspiration for any specific problem. Early MIT hacks tend to be practical jokes. One of the most extravagant witnesses saw a replica of a police car on campus placed on top of the institute's great dome.

Over time, the word became associated with the burgeoning computer programming landscape at MIT and beyond. For these early pioneers, the breakthrough was an achievement for programming versatility. These activities were greatly admired for combining expert knowledge with creative instinct.

Why hacker hacker?

Hackers' motivations vary. For some, it is economic. They earn a living through cybercrime. Some have a political or social agenda – their goal is to sabotage high-level computers to make a statement. This type of hacker is called a cracker because its main purpose is to break the security of prominent systems.

Others do it for immense suspense. When asked by SafeMode.org about the reason for distorting web servers, cracker replied, "The prominent flaw gives me a snapshot of adrenaline and then after a while I need another snapshot, that's why I can't" stop ". (1)

These days, we are facing a new type of hacker – your next-door neighbor. Every day, thousands of people download simple software tools that allow them to "inhale" wifi connections. Some only do this to eavesdrop on what others are doing online. Others do this to steal personal data in an attempt to steal an identity.

The most common attacks

1. SideJacking / Inhalation

Sidejacking is a web attack method where a hacker uses packet sniffing to steal a session cookie from a website you just visited. These cookies are usually sent to unencrypted browsers, even if the site's original login is protected by HTTPS. Anyone can listen to steal these cookies and then use them to access your authenticated web session. This is recent news because one of the programmers launched a Firefox plugin called Firesheep that makes it easy for an intruder sitting near you on an open network (such as a public Wi-Fi hotspot) to accompany many of the site's popular sessions. For example, a side accompaniment using Firesheep can take over your Facebook session, thus accessing all of your sensitive data, and even sending viral messages and wall posts to all your friends.

2. DNS cache poisoning

In poisoning in the DNS cache, data is entered into the Domain Name System (DNS) server database that is not created from trusted DNS sources. It is an unintended consequence of a wrong DNS cache configuration or maliciously generated attack on the name server. The DNS cache poisoning attack effectively changes the entries in the victim's copy of the DNS name server, so when it sends a legitimate site name, it is instead sent to a fraudulent page.

3. Man attacks in the middle

A man's attack in the middle, a bulldozer attack, or a Janus attack, is a form of active eavesdropping in which the attacker conducts independent relationships with the victims and transmits messages between them, causing them to believe that they are talking directly to each of them. Some over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages being transmitted between the two victims and to enter new messages. For example, an attacker within the receiving range of an unencrypted wifi access point could insert himself as a leg in the middle. Or the attacker can appear as a bank or online merchant, allowing victims to log in via an SSL connection, then the attacker can log into the real server using victim information and steal credit card numbers.

4. Smiling

Packet encryption tools allow eavesdroppers to intercept passively transmitted data between a laptop or smartphone and other systems, such as web web servers. This is the easiest and simplest type of wireless attack. Any email, web search, or file that you transfer between computers or open from network sites can be captured on a wireless network that is not locked by a nearby hacker using a sniffer. Inhalers are free on the web, and there are at least 184 videos on YouTube to show budding hackers how to use them. The only way to protect yourself from inhaling wifi in most public wifi hotspots is to use a VPN to encrypt everything that is being sent over the air.

5. Block networks

Also known as SQL SQL injection, this technique is a method by hackers to poison websites by putting JavaScript in an illegal way of redirecting from legitimate websites it has previously inflicted on its controllers. These javascripts redirect the visitor's computer to servers containing additional malware that can attack a user's computer.

The most common targets

Hackers are interested in many types of computers on the Internet. The following list describes different types of targets and their attractiveness to hackers. (2)

1. Corporate networks

Corporate computers are often heavily fortified, so penetration into a single computer has high models. Behind the corporate firewalls, there are repositories of customer information, product information, and sometimes, in the case of the software publisher, the product itself.

2. Web servers

Web servers are computers that contain websites. While some contain financial information for clients, web servers are usually targets of spoilers because they can be distorted to show the information that the hacker chooses to the public.

3. Personal computers

With the increasing use of Wi-Fi, laptops have become one of the most penetrating devices. Everything a person visits on the Internet can be exposed to a person using the program to "inhale" this connection. The website URL and passwords used to log into an online bank account, Facebook images and tweets, and the entire instant messaging conversation can be revealed. This is the easiest form of hacking because it requires a little skill.

4. Tablets and Palm Top devices

Tablets, mobile phones and other mobile-ready devices are as common as laptops in Wi-Fi hotspots. A hacker at a public hotspot can see a mobile device, as well as all the data that enters in and out of it, as easily as a laptop.

How can you protect yourself

The simple truth is that anyone connected to the Internet is vulnerable to hacking. Hence, there is a need to be proactive when it comes to protecting yourself from such attacks.

Inhalation attacks are the most dangerous, as firewalls and antivirus programs cannot help. Only a personal VPN can protect a person from smelling. If a potential victim is connected, if they are connected to a personal VPN, all of their data is routed through a secure server, making it impossible to sneak out an intruder. A user with a secure VPN can browse as if it was not visible to hackers. PRIVATE WiFi provides this VPN service.


1. cs.utah.edu/~elb/folklore/afs-paper/node3.html

2. informit.com/articles/article.aspx?p=425380


Related articles

SEO Web Links And Backlinks

Are web backlinks dead? What should I do for SEO? So...

Next Generation Computer Systems

Next Generation Computer Systems The change will come soon. Technology...

Data Recovery “How To Recover From A Hard Drive Failure”

How To Recover From A Hard Drive Failure Unfortunately, most...

The Pros and Cons of Keyboard Shortcuts in Excel

If you are a Microsoft Excel user, chances are...

Machine Learning: The Next Career Change Tool

Machine Learning: The Next Career Change Tool: Machine learning...

Case Studies

Compass Music Platform

A clothing brand wanted to launch a new e-commerce website that would allow customers to browse and purchase their products online. We developed a...

NewsWeek Magazine

A clothing brand wanted to launch a new e-commerce website that would allow customers to browse and purchase their products online. We developed a...

Beauty & Makeup Shop

A clothing brand wanted to launch a new e-commerce website that would allow customers to browse and purchase their products online. We developed a...