Computer Hacking Methods and Protection
Protecting your computer against hacking is different from protecting it against viruses that you accidentally or unknowingly invite into your computer that then cause damage in one form or another. Anti-hack is about protecting your computer against external entities that are deliberately trying to get into your computer to cause damage and to steal from you – or cause damage. Viruses are impersonal and hacking is personal.
Anti-Hack software is now out there for sale in addition to anti-virus software. These products protect you in ways that anti-virus software does not. Following are some examples.
DoS (Denial of Service) Attacks:
DoS attacks occur when too much traffic is directed to your company website at once. The web server essentially ‘chokes’ on the amount of traffic trying to squeeze into it’s network hardware. Attack scripts are easily downloadable and you do not need to be an experienced engineer to set afloat an attack. Upset customers seeking some sort of revenge or disruption, competitors interrupting your site, or these days, as in the recent major hospital attacks, the trend is to keep up your web site hostage until some ransom is paid or some need met. “Ransomeware” is a comparatively new term, but it is gaining a lot of visibility in recent times.
SNMP (Simple Network Management Protocol) Attacks:
Akamai’s Prolexic Security Engineering and Response Team (PLXsert) recently issued a threat advisory warning of DDoS (Distributed Denial of Service) attacks abusing the Simple Network Management Protocol (SNMP) interface. PLXsert SNMP DDoS attack campaigns target various industries including consumer products, gaming, hosting, nonprofits, and software-as-a-service, mainly in the US (49.9%) and China (18.49%). The attackers used an online tool posted by the hacker group ‘Team Poison’. This latest wave of attacks targets devices running SNMP which by default is open to the public Internet unless that characterize is manually disabled. Anti-hack software is now being produced that help prevent SNMP attacks such as this by preventing the attacker from forcing network switching to secondary gateways.
This is a little complicate but basically, a SYN flood attack is similar to a Denial of Service attack in that there is request made to the web server that ties up its resources and makes it unavailable to other connections. When a computer or web browser tries to connect to a web site, what’s called a 3-way handshake is used to establish the connection between the two computers. In a SYN/AWK Flood attack, the computer offers its hand (1-way), the server reaches out to meet it (2-way) but the offered hand is quickly withdrawn. The server waits for the hand to come back until it ‘times-out’ and then the cycle repeats millions of times. The 3-way handshake is never established and all other connections are refused while this is happening.
USB Auto-Run Attacks:
By default, Windows runs any executable, program, or script on a USB excursion the second it is inserted into any computer or laptop. This method that anyone* with unauthorized code, like a virus or a meaningful-logger or backdoor program – all of which are easily downloadable – can walk past any computer in your building, insert the USB excursion for just a second or two, and take control of your complete business without you knowing about it. Anti-virus software knows this and will try to block known vulnerabilities, but what about the unknown ones that were produced this morning?
*I want to get them thinking locally here too. Friends could do it, your wife could do it, your kids could do it, the babysitter, your priest, etc…
far away Connections:
Here’s a test; right-click on My Computer and select the far away tab, or, in Windows 8, right-click This Computer and click the ‘far away Settings’ link on the left side of the System panel that opened. Is ‘Allow far away Assistance connections to this computer’ checked? Click the progressive button and you will see how far this goes and how easy it is for your computer to allow others to connect to it. You can truly allow others to take complete control of your system.
This was designed for a helpdesk in a major corporation to connect quickly and easily without a lot of authentication fuss. The average home, school, and SOHO system is clearly not on a corporate helpdesk so closing these interoperability ‘features’ will help protect your system against external intrusion. If you ever need them back on, you can clearly turn them back on. But we don’t believe they should be on by default. Neither does the NIST, the USAF, The DoHS, or already the NSA. Check for the current settings on your computer – then update if necessary – I’ll bet you find that this setting is on, allowing far away control to externals.
Microsoft Program Inventory:
In Windows 7, Microsoft quietly introduced a characterize they call ‘Program Inventory’. A direct quote from Microsoft states: “The PDU inventories programs and files on the system and sends information about those files to Microsoft”. Not only are you regularly sending information about every installed program on your machine, but also information about every single file that a program can open. Read that quote again: Microsoft ‘inventories all of the programs and files on your system’ and they let in it somewhere buried in the guts of the operating system.
But they didn’t tell you before they implemented it. You would be shocked at what they are doing with Windows 8 and especially the new and free upgrade to Windows 10. How on Earth could you have a sustainable business form giving away your main product unless there was some enormous reward for doing so. Your information is most likely that reward. Find this window in your system settings to turn off the characterize if you wish to protect the privacy of your information.
While no system can be completely 100% obtain in today’s rapidly changing computer threat scenery, there is absolutely no reason to give intruders a helping hand. Easy-connection and interoperability features and settings need to be switched off by the dozens. The goal is to make it more difficult for intruders, much more difficult, instead of to continue to have operating systems with hundreds of open doors, windows, and step-ladders into private areas just waiting to be exploited.
Windows 10 is particularly unprotected and there are many settings you should be considering turning off to protect yourself further so be sure to learn more about this – there are many video guides for doing this obtainable on YouTube today.
In summary, there is a definite reason why hacking is on the rise globally. People have realized just how easy it is now to gain control of your computer – and they are doing it.