How to Hacker in Action

Caution: this article is intended as information so that you know how hackers work and can protect yourself and your family.Is strictly forbidden to use the information we provide for crime.

Have you ever heard the word hacker?

We believe the majority of us have had or even heard the word.And often we think negative if There are people who mention the word hacker and associate it with people who like to break into computer systems of people,break down the accounts and credit cards of people,destroying the data and various other evil activities.

Actually the term hacker is a misnomer,because the original definition of hacker is a person who has superior skills in the field of computing,and not a computer criminals.Such as a computer security expert who specializes in securing computer hacker could uga called when he did not do evil.

Actually the correct term for people other than experts in the field of computing, he also used his skills to do evil,through other people's computer systems and various other crimes is a cracker.But because the term cracker is not common, and basically the definition is still also a controversy and the term cracker itself is not common,so in this article we will call people who like to do evil against computer systems and data of other people with a common definition only,namely: the hacker.

Back to the original topic about computer security, we are confident that the majority of us have heard the term hacker and what crimes they committed.And of course each of us do not want to be a victim of hackers that many scattered in "every website" that we visit on the internet.

But nevertheless, the fact was still many computer and internet users who fall victim to attacks from hackers, that the majority has the objective to find stolen money to victims by stealing data by using their name. Losses allegedly caused by the crime the hackers are billions of yen (millions of U.S. dollars). A number of very fantastic.

The question now is: why a lot of hacker attacks can happen? The answer: one of the biggest factors why a lot of hacker attacks can occur is due to ignorance of the victim of hackers that made them attack soft targets for cyber criminals are. Just like people who do not know the characteristics or signs of people who will steal, he is likely to become victims of theft. Therefore, we need to know how the hacker in action to protect ourselves from their attacks.

That's why, in this article we will give some examples of the usual way by hackers to attack his victim. We hope this brief helpful info for you to be more vigilant and more secure from attack by hackers who are always lurking all the time.

Here are some of the modus operandi of hackers you need to watch out for:

1. Creating a Virus & Spyware

One of the favorite ways the hackers to attack his victim is by way of "classic" and very technical, that is by creating a malicious program that we know of as viruses and spyware.

Viruses are computer programs that generally works by destroying data or the target system. Normally the virus attacks the system with lots of windows operating system, although there are some viruses that attack also users with other operating systems like linux and mac. Usually the purpose of the spread of the virus is to destroy the target system, then the hacker will squeeze next victim with the demands of some money. If money is not delivered, then the virus attack victims will be enhanced and the system becomes damaged and its business activities can not run smoothly. Usually a target in a virus attack is a company that generally has money that can be squeezed.

While spyware is a malicious program that can spy on computer users who are infected by spyware. As the name implies, spy = spy. Spyware, if installed on your computer, it will detect and record your activities in cyberspace, including your email password, login and your internet banking passwords, and so on. Furthermore, data collected by the spyware will be sent to the hackers who make it, unbeknownst to the user. Then, as the user data in the hands of the hackers, they will use it to make purchases without the knowledge of their account holder or transfer funds to the account of the victims of hackers.

Both ways it is a very common and the victims can dbibilang also quite a lot. And already a lot of casualties with virus and spyware attacks like this. This is the most classic but still a lot of victims and counting. Quite dangerous.

But do not worry, because you can easily avoid spyware and virus attacks from hackers. Our advice to you in order to avoid the attack of Viruses and Spyware are pretty easy to do is to install anti-virus software and anti spyware on your computer. The majority of existing software is enough to keep you from the majority of viruses and spyware that is currently circulating.

To download the software anti-virus and anti spyware to your computer, you can try to download a wide selection of anti-virus software available on www.IDSoftwareDownload.com.

2. Creating Fake Websites

One other method commonly used by hackers to take action prey data is by creating a fake website with a name very similar to regular websites visited by Internet users. This way, when the victim does not accidentally come into the fake website and enter your username and password, then the victim's data directly recorded in the database hackers and then the hacker could do whatever he wants with the data.

One example of an interesting and quite popular in the application of this technique is that once done by www.kilkbca.com sites that seek to imitation official website of Bank Central Asia (BCA) is www.klikbca.com. As is already known to many people, at the end of the 2000s, there was a "hacker fad" that deliberately buy domain address and create a website very similar to the official website of the BCA. And consequently, a lot of customers who typed the address incorrectly BCA site fooled by the website, username and password they gave voluntarily to the fake site.

The good news is, the site manager was not a wicked man, he only intended for fun and the data obtained are not misused. But, imagine if it was malicious site manager? Well, they might have entered their username and password are wrong is losing lots of money and could not sleep quietly.

It was horrible!

So, how good way so that we avoid the deception of the fake site? For this we have two suggestions that you can do:

The first one, each time you visit a site, especially those that require a username and password to log in, make sure once again in the address bar of your browser that the address you entered is correct.

Secondly, try to bookmark the sites that require a username and password to be accessed in your browser. Furthermore, each time you visit the site, make sure you visit it by clicking on the bookmark you have created, not by typing it manually. To bookmark a website, you can try pressing Ctrl + D on your computer, on which you want to bookmark pages - can be tried now;)

Based on experience, the two ways that we mentioned can greatly reduce the number of errors type the address of a site. We strongly recommend you to always do both in order to avoid things that can hurt you.

3. Sniffing (Tapping) Victim Data

The next trick commonly used by hackers in stealing the victim was sniffing data. Sniffing in English, if freely translated means the sniff (smell), like the cat who sniffed the fish before he ate it.

But the question here is not a whiff of the nose like that. What is meant by the term hacker is sniffing "sniffing username and password" sent by the user to the destination server. Or in other words, intercepting the victim's username and password.

Normally, the workings of the transmission of data from a computer directly to the server is genuine. Example example is if you want to log into google.com, then your data should be sent directly to google.com. But if your computer has been infected by a hacker attack, then your data will be intercepted / spy in advance by the hackers, new forwarded to the google.com. The illustrations make it more obvious are as follows:

Such attacks are usually not felt by the victim, and they just realized after they lost money in the account or accounts they can not be accessed again because the password had been changed by the hacker. Very scary.

These attacks are relatively easy to do by hackers, so an attack like this is a common thing and many do, you should be wary. But do not worry, attack like this is not something that can not be overcome. There is a fairly easy solution you can do to overcome these problems, always to wear the Secure URL each time you send your username and password on the internet.

What is meant by secure URL is the website address beginning with https:// instead of http:// prefix. Note that the address is secure (safe) there is an additional letter "s", which stands for secure.

Why https is more secure? Because the URL with the https, all the data you send and you receive will be encrypted (encoded / encrypted / protected) so it becomes unreadable by hackers, so your data even if in the end managed to hack, it still will not read and will not be useful by hackers, so your original data will remain safe.

What we mean is simply an example, when previously the hacker managed to sniff your username and password data as superman (user) / superman123 (password), then with the https URL that will be read by hackers is a random data such as *&^*@#& (user) / ^^^!@(% 000 (password). Attractive and safe right? Of course.

Then how do I use a secure URL for your browsing activities?

It is easy, simply by changing your habits in the surf. That is, if you usually type in namasitus.com or http://namasitus.com to go to a particular website, now replace by typing https:// at the beginning of the website address that requires a username and password or transaction data that you normally go to.

For example: https://google.com.

Simply by using a simple trick that you have to protect yourself (and family) from hacker attacks that could be chasing you. Not hard, very easy, simply by changing your habits alone.

So make sure from now on you are using a secure URL (https) to prevent yourself from things that could be detrimental in the future - for websites that do not require a username and password or transaction data to be accessed, such tricks are not needed, such as websites we are.

4. Break (Cracking) Password In Force

The final way is quite often used by hackers is to break the password by force. In this way, although not elegant, but it proved effective enough to do and turned out a lot of victims affected by this technique.

The usual tricks used by hackers in this technique is to use a dictionary and use brute force method (try one at a time / order beans) with the help of special software to "guess" a person's username and password. By utilizing a dictionary which contains thousands of words and how to check the combination with special software, then a hacker can easily figure out the combination of a person's username and password.

So how do we protect ourselves from hacking methods such as this?

The way we can do is twofold, namely: [a] strengthen the defense system of the website so if anyone is detected trying to break the password will be automatically diblock, and [b] to change the password that we use to be more difficult than ever.

For the first way, you should contact the administrator of the website that you think needs to improve its safety. This way takes longer (but important) because you have to wait for a response administrator of the website and wait for them to upgrade their website.

For the second way, you can do it faster and easier. For example, by replacing the word which is used daily in your passwords with words is more difficult and not in the dictionary so that is not predictable, and also coupled between uppercase, lowercase, numbers and punctuation. For example, from being # S03Perm4n_T3r8 superman123 @ ng!

Thus roughly we can to make about some of the ways commonly used by hackers to break one's data and also tips to overcome their attacks. Hopefully our little share of it benefit you and also (if you apply) hopefully can prevent hackers from damage and misuse of important data you have.

Hopefully useful

No comments:

Post a Comment

Popular posts