There are various techniques and programs used for hacking. These include:
Hacker tools - programs written to access a computer system. e.g. Coldlife 4.0 & John the Ripper 1.6.
Key loggers - programs that record keystrokes from the computer keyboard.
e.g. Webmail Spy & WinWhatWhere
RATS – remote administration programs that have been embedded in an unexpecting host. e.g. Globel Killer 1.0 & Kikbac 0.9
Spyware – software that records password, internet visits and remotely execute commands. e.g. Top Text & Outwar
Trojan Horses - hidden programs that are disguised within another program that can be malicious e.g. Beast 2.00
Worms – These programs use emails to spread. They can be Spyware, Keyloggers or any software used maliciously. e.g. Virtual Bouncer 2.0
The best way to guard against these threats is to have a firewall and regularly updated anti-virus software. To check hardware and software web sites for security updates. And to educate email users about security issues.
The fact that hacking techniques and programs are so easily available is both a blessing and a curse. Network administrators can monitor these web sites to keep up to date with hacker trends. And “Joe Average†can download hacking programs and learn how to become a hacker or cracker