Welcome! Log In Create A New Profile

Advanced

Task6A-1

Posted by VincentF 
Announcements Last Post
Announcement SoC Curricula 09/30/2017 01:08PM
Announcement Demarcation or scoping of examinations and assessment 02/13/2017 07:59AM
Announcement School of Computing Short Learning Programmes 11/24/2014 08:37AM
Announcement Unisa contact information 07/28/2011 01:28PM
Task6A-1
July 21, 2008 03:13PM
There are various techniques and programs used for hacking. These include:
Hacker tools - programs written to access a computer system. e.g. Coldlife 4.0 & John the Ripper 1.6.
Key loggers - programs that record keystrokes from the computer keyboard.
e.g. Webmail Spy & WinWhatWhere
RATS – remote administration programs that have been embedded in an unexpecting host. e.g. Globel Killer 1.0 & Kikbac 0.9
Spyware – software that records password, internet visits and remotely execute commands. e.g. Top Text & Outwar
Trojan Horses - hidden programs that are disguised within another program that can be malicious e.g. Beast 2.00
Worms – These programs use emails to spread. They can be Spyware, Keyloggers or any software used maliciously. e.g. Virtual Bouncer 2.0

The best way to guard against these threats is to have a firewall and regularly updated anti-virus software. To check hardware and software web sites for security updates. And to educate email users about security issues.

The fact that hacking techniques and programs are so easily available is both a blessing and a curse. Network administrators can monitor these web sites to keep up to date with hacker trends. And “Joe Average” can download hacking programs and learn how to become a hacker or cracker
Sorry, only registered users may post in this forum.

Click here to login