text to text

Tuesday, May 20, 2008

 

One Man's Trash is Another Man's Treasure

Businesses and the daily Internet users are permanently being advised to protect themselves from unauthorized users on the Internet by employing high security systems. The need for security doesnt seem obvious to the average user, as, for most people, they dont see the point of someone poking around on their computer. They generally assume the only thing of value would be bank details or security numbers. However, in the hacking world, even the most unimportant computer is of value.

There are various different groups or sub-cultures in the hacking industry, which is roughly grouped into three different identities: White hat, Grey hat and Black hat. White hat is also known as the ethnical hacker and is interested in information technology. They tend to focus on securing and improving IT systems, whereas Black hat is concerned with breaking them. The object would be to locate files that contain passwords, find advisories and server vulnerabilities, and create error messages that contain too much information or find pages that contain network or vulnerable data.

The first big media attention to the cyberspace world of hacking was in 1983 in Milwaukee Wisconsin, where a group of boys aged from 16 to 22, hacked into various systems including the Los Alamos National Laboratory, Security Pacific Bank and the Sloan Kettering Cancer Center. They called themselves the 414s after the area code of their district. Although they got off fairly lightly, they were the reason behind the 6 new computer crime bills introduced that year.

Since then, the world of hacking has grown from serious online damage to just people fooling around. Another example of a fairly well known hack was on the 13 of September 1998 where a group called the HFG (Hacking for Girl132) hijacked the New York Times website, in response to a story they ran.

In these particular cases, the hacker has gone to extremes, but the concerns of this happening to you are fairly small. What is more likely is a hacker using your computer to network to another, or using your information to break into another system, such as your company network. Other security risks that a person should be aware off are Viruses, Computer Worms and Trojan horses.

Generally there has been a lot of discussion and media around Viruses, especially in the early days of the Internet and online applications. They generally damage programs, delete files and can reformat your hard disk. Even mild, harmless ones are able to take up your computer memory, casing your entire system to crash and lose data. The Trojan Horse has a different setup where it just sits on your computer, pretending to be just a normal file, while it installs a back door on the system to allow unauthorized access to remote areas.

The Computer Worm is generally harmless compared to the other two. It uses the network to send copies of itself to other nodes (processing location i.e.: a computer or printer). However there have been some extremes, where simple made Computer Worms have caused huge damages to companies. In 2000, an e-mail was sent round, containing a Computer Worm, that would later on be known as the "I love you Worm". The e-mail once opened would send itself to the users entire mailing list, so it appeared to come from an acquaintance to the receiver. The attachment was a file called: Love Letter for You. Within hours the e-mail had reached a global level, affecting 10% of all computers and causing $5.5 billion worth of damage.

Its not just companies but everyone that needs to invest in security systems. Its easy to think that in the world wide web with billions of users, networks and companies, you are small fry, but everyone is connected and linked and although you are in essence not much, you could very well be a link or a stepping stone to something that is. In the world of cyberspace, the old saying of one mans trash is another mans treasure?truly applies.

Celeste writes for Star Internet Business, who specialise in ISP.

Streamyx Online Registration
Streamyx Online
Streamyx Malaysia
Streamyx
Wireless Streamyx
Streamyx modem
Streamyx ISP
Ku Ez
Bighairtightpants
Blog
C Ez
?gclid=cpyq7 Nflzmcfqm3egodak Dtg
?gclid=cpzagd Ynzmcfrcdewodfhojqq
?gclid=cmybvrglnpmcfqyaewodyg9lra
Noimagea G

Archives

May 16, 2008   May 18, 2008   May 19, 2008   May 20, 2008   May 22, 2008   May 23, 2008   May 24, 2008   May 25, 2008   May 27, 2008   May 28, 2008   May 29, 2008   May 30, 2008   Jun 1, 2008   Jun 2, 2008   Jun 3, 2008   Jun 4, 2008   Jun 5, 2008   Jun 6, 2008   Jun 8, 2008   Jun 9, 2008   Jun 10, 2008   Jun 13, 2008   Jun 15, 2008   Jun 16, 2008   Jun 17, 2008   Jun 19, 2008   Jun 20, 2008   Jun 22, 2008   Jun 24, 2008   Jun 26, 2008   Jun 27, 2008   Jun 28, 2008   Jun 30, 2008  

This page is powered by Blogger. Isn't yours?