Internet development so far, in addition to its surface prosperity, there have been a number of undesirable phenomena, including hacker attacks is the most netizens headache, it is the main threat of computer network security. The following focuses on the analysis of the hacker network attack several common methods.
Backdoor software attack
Backdoor software attacks are more of an attack on the Internet. back Orifice2000, glaciers, etc. are more famous Trojan horses, they can illegally obtain the user's computer super User-level rights, can be fully controlled, in addition to file operation, but also can be the other side of the desktop capture, access to passwords and other operations. These backdoor software is divided into the server side and the client side, when the hacker attacks, will use the user-side program to log on the computer has installed server-side programs, these server-side programs are relatively small, usually with some software included. It is possible that when the user downloads a small game and run, the Backdoor software server side of the installation is complete, and most of the backdoor software regeneration ability than strong, to the user to clear the cause of some trouble.
When downloading data on the Internet, be sure to scan it before it runs and use some anti-compilation software to see if the source data has other suspicious applications, thereby eliminating the backdoor software.
Exploit network system vulnerabilities to attack
Many network systems have such a vulnerability, which may be the system itself, such as WindowsNT,UNIX and so on have a number of unequal loopholes, but also may be due to the negligence of network management. Hackers can use these vulnerabilities to complete password detection, system intrusion and other attacks.
Software patches can be installed for the vulnerabilities of the system itself, and the network administrator needs to work carefully to avoid inadvertently allowing others to take advantage.
Attack by email
e-Mail is one of the most widely used forms of communication on the Internet. Hackers can use some mail bomb software or CGI programs to send a large amount of repetitive, useless spam messages to the destination mailbox, so that the destination mailbox is blown up and unusable. When the amount of spam sent is particularly large, it can also cause the messaging system to slow down and even paralyze the normal work, which is similar to the " denial of Service attack" (DDoS) later.
for those who suffer from such attacks, some spam removal software can be used to resolve them, common Spameater,Spamkiller, and so on,Outlook and other receiving software can also achieve this goal.
Denial of Service Attacks
Many large websites on the internet have suffered such attacks. It is less difficult to implement a denial of service attack (DDoS), but it is devastating. Its specific approach is to send a large number of packets to the destination server, almost all of the server's network bandwidth, so that it can not handle the normal service request, and cause the site is inaccessible, the site response is greatly reduced or the server is paralyzed. Now common worms or viruses with their peers can attack the server for denial-of-service attacks. Their ability to reproduce is extremely strong, typically through Microsoft 's Outlook software to many mailboxes sent with virus messages, and the mail server can not afford such a large amount of data processing and paralysis.
for the personal Internet users, it is also possible to be a large number of packets of attack so that they can not do normal network operation, so everyone in the Internet must install the firewall software, but also can install some can hide the IP address of the program, how can greatly reduce the likelihood of being attacked.
Decryption attack
on the Internet, the use of passwords is the most common and most important security method, users always need to enter a password for identity verification. And now the password protection means most of the password do not identify, as long as there is a password, the system will think you are authorized normal users, therefore, access to the password is also an important method of hacking attacks. There are several ways to get a password, one is to listen to the data on the network. Because the system in the password check, the user entered the password needs to be transferred from the client to the server side, and hackers can be between the two ends of the data monitoring. However, the general system in the transmission of passwords are encrypted processing, that is, the data obtained by hackers will not exist in plaintext password, which gives the hacker to solve a problem. This technique is commonly used in local area networks, and once successful attackers will gain significant operational benefits. Another way to decrypt this is to use the brute force method to decrypt the password of a known user name. This decryption is a password that attempts to try all possible characters, but the work is very time-consuming, but if the user's password is set to be simpler, such as "12345","ABC", etc., it can be done in just a blink of an action.
In order to prevent the harm of this attack, the user must set the password in a complex setting, you can use multi-layer password, or change ideas to use the Chinese password, and do not have their own birthday and phone or even user name as a password, because some password cracking software can let the cracker input to the cracked user-related information, such as birthdays, and then make a priority attempt to password the data. In addition, the password should be changed frequently, so that the likelihood of its being cracked down a lot.
for more information on computer security, please visit Security Butler .
Common methods of computer network attacks