Sei sulla pagina 1di 6

Hacking

Prevention from this dark art of exploitation


I lost all the pictures of my 11 months old daughter with her great-

grandparents who are now deceased . – A Hacking victim


Before talking about Hacking lets discuss about the peoples who are involved in this type
of art.
Hacker is a person who seeks security weaknesses from a Computer system or a network
to gain access to it without any legal permissions from its owner or programmer. And he is
smart enough to steal passwords , bank account details , your social networking account’s
password and much more.
Hackers may be motivated by multitude of reasons such as Profit , Protest , Challenge ,
or even for enjoyment. They are highly qualified computer experts believes in doing
practical with their knowledge and playing with security systems.

Going further lets discuss about the three basic Hacking techniques Hackers commonly
use to hack your confidential data .

1. (A) Phishing Hack


phishing hack also known as spoofing which is a very basic technique to hack
someone’s online account details such as usernames and password . A hacker
design a fake login page which looks exactly like an original website , but if
username and password in entered in this fake page then it will be sent to the
hacker’s online storage system and then he can easily access your account with
the help of these details.

For Example: The original website is http://www.friendsmake.com


And Hacker’s fake website is http://www.friendsmkae.com

Here you can see the difference in the spelling of the websites. Both page will look
same and normal user get manipulated easily. And when he will enter his details on
fake page , his password will be sent to hacker’s online storage system and after
that the original page will be opened. And user normally enter their details again ,
thinking that due to some technical fault again same page is reloaded , and he will
use his account normally . On the other hand hacker is accessing his account too ,
using password he got from his online storage system .

(B) Social Engineering for phishing hack


Attracting a user to a fake login page for phishing hack is known as Social
Engineering.
A Hacker use attractive lines to attract users to his fake page , taking above
example
hacker can send you an anonymous E-mail like this

You Have 25 Friend Requests “Click Here”



And when you click there you will be redirected to that fake page that I mentioned
above.

2. Cookie Stealing Hack

Have you ever noticed whenever you enter your username and password on any
social networking website , Your web browser will ask you to remember your
password for future visits to the same website. So that next time you use that site
you will get logged in automatically.
Your web browser will create a small text file which contains your password for
future. (when you open that website again) and save it into your internal Drive.
This small text file is known as “cookies” you can say this small cookie file is a
key to your account , and yes Hacker can steal this too from your computer system.
By creating a small script hidden beside a link.
Again hacker will manipulate you to click a link with some attractive title , and
when you click that link your cookie file will be uploaded to hacker’s online
storage system and he can use it to access your account easily.

3. Key logger

(A) Software key logger
Software key logger is small program designed to record your keyboard activity
secretly , it works in background and record everything you type. And then send it
to the hacker.
It acts like a spy who keep sending your typed words to his owner.

(B) Hardware Key Logger


Hardware key logger is a small device used to record typed word secretly.
Usually it may be attached with keyboard socket in your computer system.
Nowadays it is used in many cyber cafes to steal user’s password and bank account
details.

Now the question arises

How to prevent from being Hacked ?


Here are some tips you can follow to reduce the chances of being hacked
by hackers.

1. Keep your computer system and antivirus program updated. By regularly


updating it at least once in a week.

2. Never click any link claiming for big prizes or offers without knowing it well.

3. Keep an eye on your address bar , most of the website including social network
, E- commerce , Money related organizations use https://” connection stands for
“Hyper text transfer protocol secure” is a safe connection specially designed for
these types of websites , also check the spelling of the website.

4. Change your password Every month and always Try to use a strong password
containing alphabets , numbers and symbols too ,
For eg: abhishek##66SSGGRr22

5. Before using internet in cyber cafe check if there is a black key logger attached
to the computer’s keyboard socket . ( it looks like a small black plug attached with
socket and keyboard wire) If yes ,then never use that system for accessing your
online accounts. It will steal your passwords.

“Having a great knowledge is a good thing but we


should never use this to harm peoples.
You can help peoples with your abilities , make them
smile , they will bless you and your life will be
beautiful.”





















Internet
Source of knowledge or An Addiction

Internet is a well known word in today’s modern world. From a small smartphone to a
super computer this Communication Network technology is available almost everywhere
. Useful for everyone whether you are a businessman , student , Entrepreneur or even a
housewife. This technology is coming out as a boon to our society , this virtual world
contain everything It can be a good source of knowledge but also have some
disadvantages like

Internet Addiction Disorder


Internet addiction is described as an impulse control disorder , which does not involve use
of an intoxicating drug and is very similar to pathological gambling. Some users may
develop a habit of going online without any reason , may be just because they got attached
with their online friends on social networking websites or they just got mental satisfaction
by looking to a webpage , sometimes being connected to the world via Internet gives a
huge satisfaction to an addict . This can be cured by a psychiatrist.

Here are few signs of this addiction :-
1. Thinking about previous online activities or anticipating of next online session.
2. Unsuccessful efforts to control or stop internet use
3. Gradually increasing online timing

Peoples addicted to Internet gives less time to the real world , results in weak social
understandings , connections and this leads to a great problem and disappointment
in future.

What to do if you are the one ?


Are you an Internet Addict ? Or just feeling little bit of signs in you ?
Don’t Panic
We Have some tips for you , You can try them before going for an expert advice

A. Get a hobby or an interest that does not involve Internet , Television , Video games ,
Portable media players etc.

B. If You are a student then complete your studies , buy some books and start reading
them.
C. If You are parents , Ask your child for help in cooking meals so that he/she can get
some work to do other than just surfing internet

D. Hang out with your friends , plan a trip to a beautiful place. Get some distance with
your computer or whatever gadget you use to surf Internet.
E. If you own a smartphone and a laptop too which is common nowadays then we
recommend you to use internet in your laptop only , and place it away from your eyes.

After Following these tips you may get of rid of this addiction. But if not. Then You
should consult with your psychiatrist.

Remember there is a beautiful world outside , Enjoy it , Make some real friends and live
your life at its best . Using Modern technology is a good thing but it should be used wisely
Let me give you an example of Fire , It can relieve you from teeth shattering winter. But
it can also turn you into ashes if you don’t use it in a controlled way.

Potrebbero piacerti anche