[ Pobierz całość w formacie PDF ]
ACCOMPLISHED). As you can clearly see hackers are quite adept at the art of subterfuge. They are smart, cunning and do not discriminate against who s computer they will attempt to gain access too. They will attack whoever falls prey to whatever trap they layout. IRC remains one of the primary sources of victims for kiddie hackers. The recipe for protect yourself requires you to be alert, suspicious and a little paranoia helps. Face it everyone is paranoid about something or the other. In the next chapter we ll discuss how to go about reporting hackers. 64 64 64 64 Like me: https://www.facebook.com/pages/Download-from-harks/124201754417002 Chapter 9 HOW TO REPORT HACKERS Stopping hackers can be very difficult sometimes seemingly impossible. I believe however if you use the right types of programs combined with self-education on how hackers think, you can make your computer much safer. Reporting hackers can sometimes be a little bit tricky. A lot of users never report hack attempts. Simply because they just don t care or believe that the hacker knows he can t get into their system. There is also the reason that users just don t know what steps to take once they realize their system is being attacked. Once your system is connected to the Internet, some form of system attack will eventually hit your computer. Most of the times these attacks will be completely random. While not every single attack ever made should be reported, repetitious attacks should. Repeated attacks from the same person/IP address should always be reported. This is a clear indication that someone is trying to gain access to your computer. If you are using Black Ice Defender and or Lockdown 2000, you will be able to see the IP address of the person attempting to break into your system. 65 65 65 65 Like me: https://www.facebook.com/pages/Download-from-harks/124201754417002 What do you do now that you know that someone is attempting to hack into your computer? Before you can do anything you will require some utilities. I recommend getting the following program. " NetLab Netlab has a variety of utilities combined into one easy to use application. You can obtain a copy of Netlab from: http://www.filedudes.lvdi.net/win95/dns/netlab95.html After obtaining a copy of NetLab and installing it you ll be ready. I find the best procedure for this is to begin by identifying how many times this individual has attempted to hack into your system, and at what times. (Consult your firewall program documentation for instructions on where to locate the number of attacks originating from an IP address.) Once you have identified how many times the person has attempted to gain access and at what time the most recent attack was, it is a wise idea to check if they actually got through. To check what is currently connected to your computer, do the following: " Write down the IP address you were given by Black Ice and or Lockdown 2000 " Click Start " Go to Run " Type in Command and hit Enter 66 66 66 66 Like me: https://www.facebook.com/pages/Download-from-harks/124201754417002 This will bring you to your DOS prompt again. Type the following at the DOS prompt. " Netstat This will give you a listing of all active connections to your computer and it will look something like this. Active Connections Protocol Local Address Foreign Address State TCP COMP: 0000 10.0.0.1 : 0000 ESTABLISHED TCP COMP:2020 10.0.0.5 : 1010 ESTABLISHED TCP COMP:9090 10.0.0.3 : 1918 ESTABLISHED Your information will have different numbers. I used the IP address 10.0.0.x for demonstration purposes only. 67 67 67 67 Like me: https://www.facebook.com/pages/Download-from-harks/124201754417002 If your attacker is connected to your computer, you will see his IP address in this listing. Compare this listing to the IP address you have written down. In the table above you will see numbers after a (:) For example: COMP: 2020 The 2020 represents the port number that the Foreign computer is connected to on your computer. Using our example let s take a look at the second row. This shows us that someone is connected to our computer on port (2020) from the IP address 10.0.0.5. Once you have assessed that the hacker was unsuccessful in his attempts to hack into your computer, you can proceed to gather information to report the attack. Start up NetLab [ Pobierz całość w formacie PDF ] |