Your home Internet connection leaves you vulnerable to hackers who want to access your financial and personal information.
hackers can send malicious viruses and worms, blackening to your computer. Intruders have the power to destroy your operating system or gather you data. How can you lock that computer to hackers but still have the freedom to do your business online?
A solid firewall help you to stop intruders from accessing to your computer. You keep your Internet link to the outside world but the outside world can't view you unless you want allow to them. With a firewall in place you will still have typical email access, but chat and other interactive programs will require to have your permission to access before you can use them. A firewall is powerful and unobtrusive.
The path to your computer data has two doorways. Some of your data is stored on a physical media storage device- such as a hard drive, optical disk, thumb drive, or some other. The other method is your computer memory. If you open either of these storage methods leaves your network and your data vulnerable.
Now I'm going to show you some methods that hackers use to hack in to your system and you can avoid like these effort from hackers using firewall system in your computer:
- Method 01:IP spoofing
This attack occurs when someone outside your network fool your computer into recognizing the intruder as a trusted source-either a trusted internal source ( using an IP address that is within the range of IP addresses in your network) or a trusted external IP address that your system recognizes.
IP spoofing only can lunch when a hacker get your IP address. The hacker then modifies the packet headers on his communications to your computer. A packet header is present in any transfer of computer data and is similar to a routing number on a check-the header guides the packet of data on its journey just as a routing number guides a check.
- Method 02:Network Packet Sniffing.
- Method 03:Man in the Middle
- Method 04:Distribution of Sensitive Internal Information to External Sources
- Method 05:Password Attacks
Once someone has access to your user name and password, the attackers will then have the key to personal information. There are several ways an attacker can attack to your password. Some of them are Password Guessing , Brute Force and Password Cracking.
1) Password Guessing Method
Attackers can either enter guesses password and user names manually or electronically.If you use very common user and pass then this attack method is easy to hackers.
2) Brute-Force Login Method
This is also way password guessing, however, hackers use some tools to brute force your login.
3) Password Cracking Method
This attack lunch using Password Cracking software obtains the password file in Windows and after getting pass file then they use password decrypting tool to get your password.
Article Source: http://tutorial-net.blogspot.com/2008_05_03_archive.html#
0 comments:
Post a Comment