Introduction
Consider when you are downloading free software or anything from internet or put a pendrive on your laptop, however , suddenly your system shutting down or not responding. Now you can think what is the problem? My laptop has 16 GB RAM, i7 Processor and I have done all my defragmentation and cleaned cookies. This is called malfunction of the system.
You have to believe most of the laptop are giving way to hackers. Because of people think they have enough security. People are thinking that nothing information from laptop. But that nothing would be the important to hackers.
Do you believe? Some of the Trojans are may corrupt your disk and there is no way to repair. The source of that Trojans is surely a web. Something on the web force you to download a fake antivirus software. Finally, they can control your full system function. So that laptop may restarting, Not responding, Network failure, Continuous ads on web, porn websites continuously top of the page or hardware failure.
Do you believe? Worms can spread, even if you not click it. Email attachments are the prime place to spread. Before you download some attachments, must check that mail from trusted web source, Otherwise, don’t download. If you want to download, after check that file on www.virustotal.com
Computer security is important for protecting the confidentiality and availability of computer systems and their resources. Computer administration and management have become more complex which produces more attack avenues. Network environments and network-based applications provide more attack paths.
Evolution of technology has focused on the ease of use while the skill level needed for exploits has decreased.
What you may loss because of the attacks?
Financial Loss
Data Loss
Misuse of your system and Loss of Trust
Types of security
Software and Hardware
Communication
Information
Top Ten Most-Destructive Computer Viruses
Stuxnet (2009-2010)
Conficker Virus (2009)
agent.btz (2008)
Zeus (2007
PoisonIvy (2005)
MyDoom (2004)
Fizzer (2003)
Slammer (2003)
Code Red (2001)
Love Letter/I LOVE YOU (2000)
Top Ten Most-Destructive Computer Viruses
NetBus
Back Orifice
Sub7
Beast (Pretty cool one. I will teach it at the end of the chapter. Prank your friend!)
ProRat
Zlob Trojan
SpySheriff
Vundo
Turkojan
Trojan-Downloader.Win32.Kido.a
Who is hacker?
Notable quote
"Before Google, companies in Silicon Valley already knew it was important to have the best hackers. So they claimed, at least. But Google pushed this idea further than anyone had before. Their hypothesis seems to have been that, in the initial stages at least, all you need is good hackers: if you hire all the smartest people and put them to work on a problem where their success can be measured, you win. All the other stuff-which includes all the stuff that business schools think business consists of-you can figure out along the way. The results won't be perfect, but they'll be optimal. If this was their hypothesis, it's now been verified experimentally."
- Paul Graham
A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
A hacker is a person who breaks codes and passwords to gain unauthorised entry to computer systems.
A person who is good at programming quickly.
One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.
A malicious meddler who tries to discover sensitive information by poking around.
A hacker is anonymous.
For some people, the challenge of breaking the codes is irresistible and so precautions have to be taken.
Stand-alone computers are usually safe as there is no connection for the hackers to break into. Computers which form part of networks or those with external links, such as attached modems, are in danger from hackers.
Many hackers often don't intend to cause damage or steal data, they just enjoy the challenge of breaking into a system. However, in some instances the hacker's purpose could be to commit fraud, to steal valuable data or to damage or delete the data in order to harm the company.
It might be hard to believe, but most hacking is carried out by employees with a grudge or those who want to 'make a quick buck'. They have insider knowledge of passwords and User IDs which makes it easy for them.
Hacking is not a recent invention. In fact, it has been around since the 1930s, although not always associated with computers. Here's a rundown of some of the most noteworthy hackers in history.
1: Kevin Mitnick
Kevin Mitnick, once considered the most-wanted cybercriminal in the United States, is often touted as the poster child of computer hacking. Kevin mastered an early form of social engineering (scamming operators) and computer hacking to gain access to and modify telephony switching systems. After a very public two-year chase, arrest ,and incarceration, the hacker community collectively rose in protest against what they viewed as a witch hunt.
2: Robert Tappan Morris
On November 2, 1988, Robert Morris released a worm that brought down one-tenth of the Internet. With the need for social acceptance that seems to infect many young hackers, Morris made the mistake of chatting about his worm for months before he actually released it on the Internet, so it didn't take long for the police to track him down. Morris said it was just a stunt and added that he truly regretted wreaking $15 million worth of damage, the estimated amount of carnage caused by his worm.
3: Vladimir Levin
Seeming like the opening of a James Bond movie, Vladimir Levin was working on his laptop in 1994 from his St. Petersburg, Russia, apartment. He transferred $10 million from Citibank clients to his own accounts around the world. As with most Bond movies, Levin's career as a hacker was short lived — with a capture, imprisonment, and recovery of all but $400,000 of the original $10 million.
4: Yan Romanowski
Yan Romanowski, also known as MafiaBoy, was arrested in February 2000 for launching a denial-of-service attack that brought down many of the Internet's largest sites, including Amazon, eBay, and Yahoo. Yan's lawyer claimed, "If [MafiaBoy] had used all his
Reads:
115
Pages:
176
Published:
Apr 2023
"No Filter, No Problem" by Famium is your ultimate guide to creating a visually stunning, engaging Instagram presence. Packed with insider secrets and practic...
Formats: PDF, Epub, Kindle, TXT