Chapter 3. What Hackers Do

I l @ ve RuBoard

The phenomenal growth of the Internet has been accompanied by new methods of hacking. While a user is connected to the Internet, his computer is extremely vulnerable. Some computers are always attached to the Internet. Sometimes entire local area networks keep their Internet connection open twenty-four hours a day to allow users access to the web and e-mail all the time. Hackers routinely break into networks via the Internet by spoofing the identity of computers that the network expects to be present.

Systems on the Internet without registered names , only numeric addresses, which offer no services are scanned dozens of times a day. Within minutes of publishing a new host name to Domain Name Services, the system will be profiled ” the process of determining the type of system and services available.

The description of what hackers do is largely dependent on the reporter's opinion of hackers. Many of the activities can be spun to sound benign or malicious.

I l @ ve RuBoard


Halting the Hacker. A Practical Guide to Computer Security
Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)
ISBN: 0130464163
EAN: 2147483647
Year: 2002
Pages: 210

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net