Getting an unauthorised access into any network is known as hacking the network. This was initially done to find the flaws in security system of network and fix it. But then some of the curious and greedy techies started using it for their own advantage and that is when the problem started and the ‘Hacking’ actually became illegal.
Fact 1: Even before the internet, hacking was already attempted by few mischief makers on the telephone lines.
Fact 2: Usually any software or hardware component comes with a default set of login credentials. Gaining an unauthorised access with such credentials for a hacker is a very easy task. Most of the times the system administrators do not know or do not care to change these credentials and that is when their system becomes vulnerable to hacking attacks.
Fact 3: Some of you might have some time come across a free WiFi and were able to connect to it without any password. You might have been very happy to find one such bounty. But this might be a trap. There are some hackers who provide free WiFi and access the unprotected data in the system who use these WiFi networks.
Fact 4: Most of the websites now have a page where there are dynamic content, which means the contents are subjected to user action and the information is then sent to the database. These input sections which collect some particular type of inputs are sometimes input with certain commands instead of simple usernames or passwords by hackers. Such commands are usually not accepted by the input sections, but if they are accepted then there are chances for a hacker to be able to manipulate the database. These types of hacking are considered as most critical and are called ‘SQL Injections’.
Fact 5: Cookie stealing or Session hijacking is a way of hacking cookies from the browser. The browsers store certain text information when a user enters a site. This information is used by the website to better assist the users. Hackers steal these cookies and manipulate them for their advantage. Clearing your cache and cookies very often can help little bit to save you from this. You can also enable your browser settings to show the sites that collect your cookies during a session. This way if there are any unrecognised sites, you can discontinue and clear the cookies and prevent your cookies from being stolen.
Fact 6: Key- Logging is also a kind of hacking where the hacker sends an infected file which when executed infects the system in which it is executed. Once it gets infected, each key press entered in the system can be viewed by the hacker. This way the hacker gets each and every password and other credentials of the victim and can easily use them for his own advantage.
Fact 7: Having a strong complicated password may provide security upto certain extent but sometimes no matter how complicated the password is hackers will get access to the account. Most of the networks sends password in encrypted form, but there are few networks which still do not do this. These network that send passwords in the text form can be easily hacked. In such networks, no matter how strong the password it is always vulnerable to attack.
Fact 8: It is not true that when software is new it is completely safe. Some of the software come infected with some backdoors. Usually such backdoor are retained upon Government request for security purposes, but this makes the system vulnerable to hackers.
Fact 9: Bait and switch is the most common type of hacking found these days. Whenever one goes to website which provides free downloadable stuffs, they are vulnerable to such attacks. Most of the viruses from the internet are spread this way. Here the hacker buys a space on the website to advertise for a genuine content and embed the malicious content within it. When the users try to download genuine content, they end up having malicious content in their system.
Fact 10: According to Electronic Frontier Foundation’s Peter Eckersley, every website should have HTTPS instead of HTTP even if they do not process payments. Becuase when there is no HTTPS, there are chances that others can get an access to the information regarding what people are reading or doing on that website.
Leave a Reply