[ Pobierz całość w formacie PDF ]

ACCOMPLISHED).
As you can clearly see  hackers are quite adept at the art of
subterfuge. They are smart, cunning and do not discriminate
against who s computer they will attempt to gain access too.
They will attack whoever falls prey to whatever trap they layout.
IRC remains one of the primary sources of victims for  kiddie
hackers.
The recipe for protect yourself requires you to be alert, suspicious
and a little paranoia helps. Face it everyone is paranoid about
something or the other. In the next chapter we ll discuss how to
go about reporting  hackers.
64
64
64
64
Like me: https://www.facebook.com/pages/Download-from-harks/124201754417002
Chapter
9
HOW TO REPORT HACKERS
Stopping hackers can be very difficult sometimes seemingly
impossible. I believe however if you use the right types of
programs combined with self-education on how hackers think,
you can make your computer much safer.
Reporting hackers can sometimes be a little bit tricky. A lot of
users never report hack attempts. Simply because they just
don t care or believe that the  hacker knows he can t get into
their system. There is also the reason that users just don t know
what steps to take once they realize their system is being
attacked.
Once your system is connected to the Internet, some form of
system attack will eventually hit your computer. Most of the
times these attacks will be completely random. While not every
single attack ever made should be reported, repetitious attacks
should. Repeated attacks from the same person/IP address
should always be reported. This is a clear indication that
someone is trying to gain access to your computer.
If you are using Black Ice Defender and or Lockdown 2000, you
will be able to see the IP address of the person attempting to
break into your system.
65
65
65
65
Like me: https://www.facebook.com/pages/Download-from-harks/124201754417002
What do you do now that you know that someone is attempting
to hack into your computer?
Before you can do anything you will require some utilities. I
recommend getting the following program.
" NetLab
Netlab has a variety of utilities combined into one easy to use
application.
You can obtain a copy of Netlab from:
http://www.filedudes.lvdi.net/win95/dns/netlab95.html
After obtaining a copy of NetLab and installing it you ll be ready.
I find the best procedure for this is to begin by identifying how
many times this  individual has attempted to hack into your
system, and at what times.
(Consult your firewall program documentation for instructions on
where to locate the number of attacks originating from an IP
address.)
Once you have identified how many times the person has
attempted to gain access and at what time the most recent
attack was, it is a wise idea to check if they actually got through.
To check what is currently connected to your computer, do the
following:
" Write down the IP address you were given by Black Ice and
or Lockdown 2000
" Click Start
" Go to Run
" Type in Command and hit Enter
66
66
66
66
Like me: https://www.facebook.com/pages/Download-from-harks/124201754417002
This will bring you to your DOS prompt again.
Type the following at the DOS prompt.
" Netstat
This will give you a listing of all active connections to your
computer and it will look something like this.
Active Connections
Protocol Local Address Foreign Address State
TCP COMP: 0000 10.0.0.1 : 0000 ESTABLISHED
TCP COMP:2020 10.0.0.5 : 1010 ESTABLISHED
TCP COMP:9090 10.0.0.3 : 1918 ESTABLISHED
Your information will have different numbers. I used the IP
address 10.0.0.x for demonstration purposes only.
67
67
67
67
Like me: https://www.facebook.com/pages/Download-from-harks/124201754417002
If your attacker is connected to your computer, you will see his IP
address in this listing. Compare this listing to the IP address you
have written down.
In the table above you will see numbers after a (:)
For example: COMP: 2020
The 2020 represents the port number that the Foreign computer
is connected to on your computer.
Using our example let s take a look at the second row. This
shows us that someone is connected to our computer on port
(2020) from the IP address 10.0.0.5.
Once you have assessed that the  hacker was unsuccessful in
his attempts to hack into your computer, you can proceed to
gather information to report the attack.
Start up NetLab [ Pobierz całość w formacie PDF ]
  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • mons45.htw.pl
  • Wątki
    Powered by wordpress | Theme: simpletex | © (...) lepiej tracić niż nigdy nie spotkać.