Understanding the true face of hackers from the means of intrusion

Source: Internet
Author: User

Hackers to everyone's impression has been very mysterious, to everyone's impression has been a particularly cool buddies with notebooks, open notebooks, very professional input of various code and then the other computer to break, and then deep in the name of a gentle wave, and only take away those important data. But how does the actual hacker technology do the intrusion? Let's talk about it casually.





650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M02/89/57/wKioL1gQV_SBxdMaABFjASjOozo564.png-wh_500x0-wm_3 -wmp_4-s_1885292019.png "title=" S1.png "alt=" Wkiol1gqv_sbxdmaabfjasjoozo564.png-wh_50 "/>

There's no connection, and it's hard for hackers to invade

Hacker technology is simply through the Internet transmission, in the other computer running their own code, so, the first to have the condition is the other computer must be networked, if the other computer is not networked, you can not know the technology of cattle, only to find a U disk to each other on the computer to engage in.


Hacker technology usually uses several means to invade your computer, software defects, hardware defects, network protocol defects, management personnel defects and human error.

650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M01/89/57/wKioL1gQWAqzZ9OkAACALrd2Hmk196.jpg-wh_500x0-wm_3 -wmp_4-s_399432869.jpg "title=" s2.jpg "alt=" Wkiol1gqwaqzz9okaacalrd2hmk196.jpg-wh_50 "/>

Hackers don't look for devices that are not vulnerable

First of all, the software defects, we are on the computer or mobile phone, especially on the Android phone, many software installed, there will be prompts to display, need to authorize the software to access Internet rights. and hacker technology and this process is the same, through a number of applications, on the Internet to put their own code on your electronic devices to run to achieve their own purposes. More common is about 2000 years of QQ Trojan, the other through QQ to send you a package, you run, you computer poisoning. This package is the code written by the hacker.

650) this.width=650; "Src=" Http://s1.51cto.com/wyfs02/M00/89/57/wKioL1gQWCyRzp1yAASkJFP5cyc846.jpg-wh_500x0-wm_3 -wmp_4-s_3347689361.jpg "title=" s5.jpg "alt=" Wkiol1gqwcyrzp1yaaskjfp5cyc846.jpg-wh_50 "/>

Hardware defects will not have to chat more, this is actually through the hardware interface to access your computer. Our computer interface is not just USB, there are other interfaces, look at the socket behind the desktop host you know.


Network protocol flaw is a very common means used by hackers. Commonly used TCP/IP protocol is a certain flaw, the hacker through the protocol content, so that their own code is agreed to license, or bypass the protocol to access your computer or Web server, run their own code on the computer.


Management defects and human defects we'll see you tomorrow.


Please pay attention to our attention, more information security.

650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M00/89/5A/wKiom1gQWQTSxqFaAAE-6w0b4rk844.png-wh_500x0-wm_3 -wmp_4-s_3271212145.png "style=" Float:none; "title=" S02.png "alt=" Wkiom1gqwqtsxqfaaae-6w0b4rk844.png-wh_50 "/>

650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M01/89/57/wKioL1gQWQSxqJbFAACSVfIDgSk342.jpg-wh_500x0-wm_3 -wmp_4-s_3083690679.jpg "style=" Float:none; "title=" subscription number security. jpg "alt=" wkiol1gqwqsxqjbfaacsvfidgsk342.jpg-wh_50 "/ >


This article from the "12173295" blog, reproduced please contact the author!

Understanding the true face of hackers from the means of intrusion

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.