Hi Sheilesh
My take on security is much like yours:
• 52 million hits on Google if one types in “hacking†It seems as if the two sites I’m listing and the others suggested in the forum are less than a drop in the bucket.
www.catb.org
www.puremango.co.uk
• Hacking tools like Security exploit; vulnerability scanner (e.g. port scanners to see which ports are “openâ€; packet sniffer (captures TCP/IP packets which can be used to capture e.g. passwords); spoofing attack (essentially an assumed identity by hacker); rootkit (hides the fact that the computer’s security has been breached); social engineering ( a person unsuspectingly reveals sensitive information about a system because the hacker poses as someone who has permission to obtain such information) are a constant menace.
Then there are the Trojan horses, worms and viruses that are well known.
• Hacking cannot be 100% prevented. Hackers are motivated by a host of reasons, some malicious, some academic, some more ambiguous. Hacking poses a personal challenge to some people and hence will always elicit a response. Programming is dynamic – hacking follows suit.
Maintaining firewalls and software, e.g. Norton Anti-virus and AVG, protecting computers against spyware and viruses, and regularly updating that software can offer reasonable protection against hacking.
• Hacking information so freely available invites too much attention from would-be hackers. But, the person intelligent and determined enough to hack into sensitive systems will not need the internet for their information. Much of the information freely available will be able to be blocked by anti-virus software. Still, hacking can be expensive because, for example, instructions “How to hack into a Coke machine†and many other items are available in the internet and small merchants, not just computer users, may suffer petty crime.
• Computer hacking can deliver anything from inconvenience to serious breaches of security thus network administrators have to monitor hacker sites. They are duty bound to inform their clients about imminent threats. This can only be done if they are fully informed about the latest hacker trends.