I am afraid of hackers!

Source: Internet
Author: User

Some time ago, hackers frequently intruded YAHOO! And other major websites that have completely paralyzed the network. Some time ago, the 163 e-Post Office was said to be slow due to hacker attacks, such as snails. When you think of this, you can't help but feel: hackers? I'm afraid!
Compared with LAN users, General dial-up Internet users are often at a disadvantage in preventing hacker intrusion. However, many online worms have always had an indifferent attitude towards network security. They believe that they are at most suffering thousands of yuan from account theft, I didn't think of a stolen account. If hackers use it as a springboard to engage in network damage, you may have to hide it. According to a sample tracking by a friend of the author on dial-up Internet users, I found that in the city of Guangzhou, three or more users did not change their account password within half a year! As hacking activities become more and more easy, it is time to improve network security awareness. The following methods will help dial-up Internet users to prevent hacker intrusion.
I. Frequent password changes


It is a simple and effective method. Many hackers use brute force to crack passwords. password cracking programs such as John can be downloaded free of charge from the Internet, as long as a dictionary is large enough to run on a machine that is fast enough, you can obtain the account and password you need. Therefore, it is very effective to often modify the password to deal with such theft. As many potential hackers do everything they can to obtain others' passwords, dial-up Internet users should strengthen prevention. The following four principles can improve the password's anti-cracking capabilities.
1. Do not use common words as passwords.
2. Mix words and symbols to form a password.
3. Use a password of more than 9 characters to keep your password as long as possible. For Windows systems, a password of at least 9 characters is considered safe.
4. It is best to mix uppercase and lowercase letters in the password composition. Generally, the password is composed of only English letters. The password can contain 26 or 52 letters. If a password consisting of eight letters is cracked, the password contains uppercase or lowercase letters, which may lead to a 256-time difference.

2. ask others to change their passwords immediately after installation


This is an easy-to-ignore detail. For the first time many users don't know how to dial up the Internet, they ask others to teach them. In this way, they often tell the user name and password to this person, this person remembers that he can go back and steal the service. Therefore, it is best for users to learn how to dial and then apply for an Internet account, or first ask the ISP how to change their password, and immediately change the password after others teach themselves how to dial, avoid theft.

3. Use the terminal window function after dialing

Select a connection, right-click, and select "properties/General/configuration/options/terminal window after dialing". Then, when dialing, do not enter the user name and password on the dial-up interface (do not select "Save Password"), and enter the corresponding name in the displayed dial-up terminal window, this prevents the user name and password from being recorded in the password file on the hard disk, and prevents some hacker programs from capturing the user name and password.

4. Delete the. pwl file

There are usually some password files suffixed with ". pwl" in the Windows directory. ". pwl" is the abbreviation of password. For example, a security vulnerability exists when the password is saved in the original Windows 95 operating system, allowing hackers to easily obtain the password stored in the pwl file using the corresponding program. This vulnerability has been fixed in Windows 97. Therefore, you need to install Windows 97 or later for your computer. Pwl files often record passwords used elsewhere, such as the password for enabling the Exchange email box and the password for playing the Mud game. These pwl files should be deleted frequently to avoid leaving the passwords on the hard disk.

5. Prohibit installation of the key logging program

Many people know the doskey.exe program. This common external command in DOS can speed up the input of commands by restoring previous commands. in Windows, there are also many similar programs, such as keylog, it not only records the user's key-down actions, but also records what happened on the screen in the form of snapshots. In addition, some programs can record the key-letter to a specific file in the root directory, which can be viewed in a text editor. The password is leaked in this way. hackers only need to check the password in the root directory, without any professional knowledge!

6. Dealing with Trojans

A Trojan program is often defined as a program that actually executes another task when executing a task, this kind of program can be described in terms of "Crossing the sea in the sky" or "Wolf in sheepskin. A typical example is to forge a login interface. When a user enters the user name and password on this interface, the program transfers them to a hidden file, then, the system prompts an error and requires the user to enter it again. Then, the program calls the real logon interface to allow the user to log on, as a result, the user obtains a file with the user name and password recorded almost imperceptible. There are many so-called Trojan Horse programs on the Internet, such as the famous BO, Backdoor, Netbus, and Netspy in China. Strictly speaking, they belong to Client/Server (C/S) programs, because they often contain a server program for resident on the user machine and a client program for accessing the user machine.

As if the relationship between NT Server and Workstation is the same.

There are several methods to deal with Trojan Horse programs:
1. Read readme.txt multiple times. Many people download some Trojan Horse software packages for research purposes and rush to execute the programs without figuring out the specific functions of the software package, in this way, the server program is mistakenly executed, and the user's computer becomes a victim of the Trojan horse. The readme.txt file that is often included in the software package will have detailed function introduction and instructions for use of the program. Although it is generally in English, it is necessary to read it first. If you really do not understand it, it is best not to execute any program, discarding a software package is of course the safest. A good habit of reading readme.txt before using any program is required.
It is worth mentioning that multiple programs can be used as executable readme.exeforms. readme.exe is often bundled with a virus or trojan horse, or simply renamed by virus programs and Trojan Horse server programs. The purpose is to mistakenly assume that the program instruction file is used for execution, the intention is sinister. Readme.exe obtained from the Internet is better not to execute it.
2. Use anti-virus software. Anti-Virus Software in China has released some Trojan Horse removal functions, such as KV300, KILL98, and rising. They can be checked and cleared occasionally offline. In addition, some anti-virus software also provides the network real-time monitoring function, which can enable an alarm or cause execution failure when hackers execute files on users' machines from the remote end, this prevents further losses because hackers cannot correctly execute executable files uploaded to user machines.
3. Immediately stop. Although there are many reasons for the sudden slowdown in Internet access, there is reason to suspect that this is caused by a Trojan Horse. When intruders use a client program of the Trojan to access your machine, it will seize the bandwidth with your normal access, especially when intruders download files from the user's hard disk from the remote end, normal access will become very slow. In this case, you can double-click the connection icon in the lower-right corner of the taskbar and observe the "sent Byte" item carefully. If the number changes to 1 ~ 3 kbps (1 ~ per second ~ Bytes), almost certainly someone is downloading your hard disk file, unless you are using the ftp function. Users who are familiar with TCP/IP ports can enter netstat-a in MS-DOS mode to observe all the current communication processes connected to your machine, when a specific IP address is using an uncommon port (usually greater than 1024) to communicate with you, this port is probably the communication port of the Trojan horse. What you can do when you find the above suspicious signs is: Immediately stop and check whether there is a trojan horse on the hard disk.
4. Observe the directory. Common users should always observe the files in the c:, c: windows, c: windowssystem directories. Use NotePad to open non-execution files under c: (Files other than exe, bat, and com) and check whether the Trojan horse and key-hitting program recording files are found. In c: in Windows or c: Windowssystem, if there are executable programs with light files without icons, you should delete them and then use anti-virus software to clean them up.

7. Try not to use the shared hard drive function

Windows 98 users who use the remote dial-up access LAN function should use hard disk sharing and file sharing functions with caution. Sharing means allowing others to download files. When a hard disk or folder icon is held by hand, it indicates that the sharing function is enabled. Select this icon, select "share" in the "file" menu, and then select "share ", the hand disappears.

8. Do not use the "MyDocuments" folder to store Word and Excel files

By default, Word and Excel files are stored in the "MyDocuments" folder under the root directory. After a Trojan horse turns a user's hard disk into a shared hard disk, intruders can see at a glance what the user is doing from the file name in this directory. This directory is almost the user's feature identity. Therefore, to ensure security, change the working path to another directory, the deeper the hierarchy, the better. For example, c: abcdefghijkl. It is certain that there are no absolute security measures on the Internet. An important rule of hacker intrusion is that intruders not only use one method to intrude, this means that only blocking all vulnerabilities can prevent intrusion, which is obviously impossible. The irony is that many security measures themselves bring new security risks, just as drugs often have side effects. Maybe you don't have these troubles if you don't access the internet. Can you say that if you don't use a computer, there will be no worries! Indeed!
Hacker-I am afraid!

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.