Janis Krumins
Introduction
This course work is to analyze how reliable is the information on our computers and servers, describe the main information threatened, their objectives and motives, as well as their methods and how to fight it. Also discussed will be the most famous hacker representatives and their works. As the main information sources richardson real estate used include Markt & Technik publishing the book "Hackers Guide New Technology", a variety richardson real estate of unofficial books as "HackerLand", "Hack Cyberdemons Bible" and a standard richardson real estate internet search machines such as: www.google.com http://astalavista. box.sk, www.yahoo.de, etc. Since the topic is very broad term paper then isolate themselves from lesser-used operating systems, and the recording of a full range of program errors or security deficiencies, but only the most common and imminent. As the main source of threats will look at a person, rather than other factors. Of the programs richardson real estate that have been designed with the aim to repel hacker attacks will mention only the most popular and potent.
Nowadays, information is more valuable than ever, and its volume is unprecedented in size. It's all thanks to computers and the internet, but every good thing has its own dark side, as easily as we can get the information from the network as easily as it can also be done from our computers, richardson real estate these people can be called a threat, but other Internet users about endangered. Who are these people who want to and are able to break into other computers, richardson real estate steal or destroy information stored on them and what are their motives. richardson real estate This will be discussed in this chapter.
First, it should be noted that the hackers were not, but Kraker (Crackers) on the internet a lot of discuss the differences between their things, now pieņemtākais view is that: A hacker is a person who was interested in the structure and operation of the program. Hackers usually programmers, and thanks to his knowledge they acquire in-depth knowledge of application security failures and their causes. Hackers are constantly looking for new knowledge and happy to share their discoveries and never consciously richardson real estate avoid destroying data. So the hacker motives are of interest for the computer systems, the desire to discover new programming errors and to correct them. Kraker is someone who maliciously breaks into computers, and when he had made unauthorized access to this or these computers, then he destroys sensitive data, disrupt the work of other users or problematic computer operation. Kraker can be easily deduced from the fact that their intentions have been abused. Kraker motives complicate life nezinīgiem users, steal and destroy their personal information, to laugh at them as they torment grasp what is really richardson real estate going on.
Endangered are all internet users who do not know how or can not fight against richardson real estate hackers. There are several reasons why this situation has arisen: Not all people are equally educated computer skills; Not all people interested in computers, the Internet is still new, and constantly have the need for new technologies and new opportunities that present themselves along also brings new security holes, such as Microsoft Active X, especially if the information is stored in a safe place, then it will be difficult to access, richardson real estate so it is used to trade-off between security and ease of access richardson real estate for persons belonging which unfortunately gives hackers the opportunity to obtain and destroy data, not yet fully developed due to cybercrime legislation; The Internet is still in the development stage.
Most of these programs are not a security risk, but they can interfere with the work of computer systems, such as routers or if the mail server is continuously exposed to Denial-of-Service attacks, then that network users will be more difficult access to certain network resources. Every system administrator should know the three types of destructive programs: E-Mail Bomber and list linking (registers mailing-lists) Denial-of-Service Program Computer Viruses
These are programs that will automatically send thousands of e-Mail to some or particular mailboxes. E-Mail richardson real estate Bomber present a safety hazard, but it is intrusive. Popular E-Mail Bomber is "Kaboom", "Gatemail", "Unabomber", etc. The most effective protection against such problems is: Mail-Filter, Kill Files (they are programs with which you can withdraw from the letters that are sent by mail - Bombers). Even if you can in case you start to bombard someone to turn to his postmaster or the need to write a script that automatically detects the sender address, and for him, sent by Maile sends every 10 or 10,000 return.
It is a newer and more insidious method of a complicated life, such as those in e-mail richardson real estate as an Kaboom Bomber and Avalanche offers a specific e-mail address to register hundreds richardson real estate of mailing lists, and then the unfortunate owner of the address on the day will receive thousands of mails it to lapse, is then manually each mailing list of this service should be abandoned. Particularly problematic in this lie
No comments:
Post a Comment