Jump to content
xisto Community
Sign in to follow this  
Nik1405241546

Internet Security

Recommended Posts

I am trying to find out if someone can obtain email address of another person or any other personal information in the computer by using a hacking software. Does the hacker need to access the other person's computer or do they do this any other way? What will be a comprehensive startegy to maximise internet security?Is antispyware software enough to stop others hacking into the computer and collecting any personal information?

Share this post


Link to post
Share on other sites

I am trying to find out if someone can obtain email address of another person or any other personal information in the computer by using a hacking software. Does the hacker need to access the other person's computer or do they do this any other way?
What will be a comprehensive startegy to maximise internet security?
Is antispyware software enough to stop others hacking into the computer and collecting any personal information?


OK, Question 1 No, they don't HAVE to. They can, but they can also phish your information.
Phishing is where the hacker creates a website that looks identical to the original, but it isn't, they get your information and leave you high and dry.
Question 3:
1. Antispyware protects against spyware...
2. Virus's are not spyware
3. Virus's such as keyloggers can get more than your email, it can get things such as your credit card number.
Question 2: To fix this problem google AVG Anti Virus free. Download it, install it, scan your computer weekly.

Share this post


Link to post
Share on other sites

There are numerous ways of getting personal information:

 

Phishing

They send you an e-mail and request you to fill in an online form. The best protection is not the believe these mails. Almost no company send you and e-mail out of the blue just for filling out some extra information (if your bank sends you an e-mail to fill in some extra information, it's best to contact them first through phone ... if they didn't send the mail, at least they know someone is abusing their name).

 

keylogger/rootkit

These are small programs that record everything you type. The most common form of a keylogger is a rootkit. These programs are very hard to detect and can't be seen with the taskmanager. Most virusscanners/malwarescanners detect 'normal' keylogger, but for a rootkit you'll need a program like rootkitrevealer, f-secure blacklight or AVG anti-rootkit. A firewall can provide protection too, but it usualy won't protect you from rootkits.

 

trojans

These little programs open ports to your computer so anybody can easily access your computer from the internet. These come as rootkits too. Protection: virusscanner, rootkitscanner and a firewall.

 

Exploits

Exploits are also used to get your personal information. Eg. when you have IE or FF to store your passwords, a hacker can make a site that exploits a security leak and sends him all your passwords. Seems logic that the program should have a security hole first before it can be exploited. The best way to protect yourself is using the most up-to-date version an regularily check for new versions or patches. Using less known programs helps too because hackers aren't interested in getting only a few information from the small group of users.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.