Welcome! Log In Create A New Profile

Advanced

Task 6a-1

Posted by SteveG 
Announcements Last Post
Announcement SoC Curricula 09/30/2017 01:08PM
Announcement Demarcation or scoping of examinations and assessment 02/13/2017 07:59AM
Announcement School of Computing Short Learning Programmes 11/24/2014 08:37AM
Announcement Unisa contact information 07/28/2011 01:28PM
Task 6a-1
July 18, 2008 10:22PM
Hackershomepage.com has a different view on the subject in that it sells equipment and or plans of how to build devices which will affect the way computer or microprocessor controlled systems operate. Ie to manipulate gambling machines, phones etc

a. What sort of hacking tools and techniques are described or readily available for download?

There are many types of hacking tools and techniques available from the internet, the majority of which mirror legitimate use software. ¡§RATS¡¨ allow hackers the opportunity to access and control your PC, but also allows the administrator and support functions to be remote from the users site.

Other hacking tools include various forms of spyware, again legitimately (invasion of privacy?) used by employers to ensure employees are doing actually work.

Well known tools include Coldfile5, DeCSS (removes encryption from DVD¡¦s) Intellitamper (activity monitor including keystroke and screen shots) and a multitude of password breakers.

„X WWW.cquis.com sells a CD entitled ¡§The CD hacking guide¡¨ which includes hacking files viruses, hacking tutorials etc but the darkfull.demon.co.uk

b. How do suppose these techniques might be prevented?

Maintaining a good FIREWALL and regularly updating system security is critical in preventing hacking.
Have specialist service providers attempt to crack systems

c. Is it good that such detailed instructions are so freely available on the internet?

Yes and no. Making detailed instruction and software available encourages the application of these techniques by ¡§new¡¨ hackers. If the material was not readily available, the new tools developed would give the hackers considerable advantage before the defnse methods could be developed.

d.)Should network administrators monitor hacker sites? Why or why not?

Absolutely! Security systems have to be developed to counter hacking technology and it would be akin to sticking ones head in the sand to ignore these sites as they give indications of what is available and also a foretaste of what could be coming. The security specialists and administrators need to try and stay ahead of the game.
Sorry, only registered users may post in this forum.

Click here to login