Thursday, February 15, 2007

Need To Register Dune Buggy In Ontario

Invite Hackers at home?

hacker Is that hackers try hack your pc now? What can they do?

University of Maryland tested the phenomenon by installing linux 4 computers with weak security in order to analyze the behavior of hackers ...

It appears that each of the pc was attacked 2244 times a day on average, this represents a attacks every 39 seconds!

The study shows that the majority of attacks are more sophisticated, and employ automated scripts that will test thousands of computers to randomly discover vulnerabilities. For this they use a list of user names (ex: root, admin, test, guest, info, adm, mysql, user, administratoret oracle) and passwords that are either copying the user name is a simple code (eg 123456, password, 1234, 12345, passwd , 123, test 1).

Once hackers have access to a computer check to see if they can be useful. Most of the time they begin by checking the software configuration, change the password, re-check the configuration, and upload to install a program (or a backdoor Trojan horse that erases their tracks), which allows them to create botnets to attack or do even more spam. The difference with

computer and a website is very low you can imagine that your websites are suffering the same attack and perhaps even greater scale. We talk about the attacks which are targeting the websites in our next article.

SOURCE: University of Maryland's A. James Clark School of Engineering

Botnet: Botnets (or zombies) are networks of PCs infected by computer viruses or Trojan horses, controlled via the Internet most often for malicious purposes. One or more persons taking control of all machines get infected and considerable ability. In addition to serving paralyzing traffic, the engine spamming, botnets can also be used to commit crimes such as stealing bank details and identity scale. Botnets are more in favor of criminal organizations that pirates isolated, and can even be leased to third unscrupulous.

0 comments:

Post a Comment