Computer Security - all about hacking
Computer Security, how hackers get a hold of information on remote computers anywhere in the World, what could and must be done in order to protect computer information.
Security holes discovered in the past. Common mistakes people make at home and in the office and how they let intruder get through security. Antiviruses, why they can't help us all the time.
Those and many other questions covered on our pages.
Ask the IT Security Experts: Top Queries of June, 2009
Got a question about IT security? The experts at ITSecurity.com can help. Issues ranging from data security to sexuality hit the experts each month.
Here are the top queries from June, 2009:
Husband denies looking at porn: The IT Security experts get more queries (complaints, actually) about Defender Pro than any other single subject, but after that the clear second-place winner is porn. The queries usually come from women who find evidence that their husbands, boyfriends or ex-boyfriends have been looking at porn, while the men always deny it — with various explanations for how those incriminating files got onto their computers. This month's example is from Maria, who discovered titles of erotic movies and pictures in her husband's Real Player. Her hubbie swears this is all the result of spyware; he never looked at those movies, and in fact he never even knew they were there. Apparently, while surfing, he found his way to some sites where xxx advertisements stored cookies on his hard drive. At least that's his story. Maria wants to know if the experts find his explanation believable.
One expert pointed out that when it comes to porn, it’s pretty hard to avoid some contact with it on the Internet even if you’re not looking for it. And yes, innocent-looking links can suddenly drop you in the middle of graphic porn sites where no matter what you click you can’t get out. Having said that, the same expert wonders what kind of sites Maria's husband is looking at, and suggested that it might be time for Maria and her husband to have a serious discussion about porn. The husband isn't necessarily lying, but the fact remains that looking at porn is probably the single most popular thing to do online, and pretending that it isn’t won’t help. Read all about it, and add your own comments, here.
Did my friend hack into my computer?: Recently, Cardaso left his computer at a friend’s house. Now, this "friend" seems to know everything Cardaso does online, and Cardaso is wondering if his pal could have hacked into his computer. So, did Cardaso's friend do it? Yes! Of course! Duh! One expert said that leaving a computer at a friend's house is the single dumbest thing you can do, at least in terms of leaving yourself open to a malware invasion. While Cardaso's computer was at the friend’s house, he could have done anything to it: installed a key-logger, any number of snooping apps and backdoors or other sneaky stuff. Solution? Cardaso needs professional help to clean the malware off his system; he'll probably need to reformat the drive and get all-new online accounts and passwords. Also he should ask himself: What kind of friend is that? For more details, or to add your own advice, click here.
Forgot my AOL password: Heather has a free AOL account — or at least she had one, many years ago, that she hasn't used in decades, and can’t remember its password. Nor can she remember the answers to any of the security question on the account. How can she reset her password? The experts get lots of questions like this. The best way to recover your password is to not forget it in the first place. Some experts recommend putting all your passwords in one text file, encrypting it with serious software, and memorizing the one password to the encrypted file. Others suggest writing a list of all your passwords and putting it in a safe deposit box, or (for any would-be spies out there) writing it in invisible ink. In any case, Heather's query seems to be generating one of the liveliest threads on the site, as various experts and absent-minded users add their comments. Check it out here.
In the clutches of the evil computer genius: D's ex is a computer expert, but D is no fool either — and when they separated she had her machine thoroughly checked out. The investigators found a password replicator as well as a download of her Hotmail account. D got rid of that machine immediately and bought a new laptop. Then, working from her job site, she changed all her email accounts, passwords and so forth. She also changed the password on her Webmail and on the NetGear router she uses at home. However, in spite of all this paranoia, when she checked her GMail recently she saw different IP addresses accessing her account. Weirder still, the other night her machine started automatically (it said it had to do some sort of maintenance) and afterward she discovered strange lines in her modem log suggesting outgoing emails. Has she been compromised? Again? Expert Mike answered Yes to the first question; there's no doubt that D has been hacked. However, there's no special reason to believe her ex is behind it. Computers are compromised all the time — usually by downloading games, music, cute videos, or unknown email attachments. Mike recommended checking iplocation.com to see where those emails have been going, and taking appropriate action. Add your own comments here.
Copyright dispute: Roman admitted that this isn't exactly an IT security query, but he's wondering how to find out when a particular image was added to a particular Web site, especially if a copyright dispute over that image is involved. Expert Robert Schifreen suggested a number of gambits, depending on the server the image is running on and the OS it uses. Expert MichaelG believes that if a legal argument is involved, it may make sense to hire a copyright attorney experienced in this technical field and let him contact the site owners. Either way, there's lots of space for you to chime in, so go here and take your shot.
Ten most famous World hackersThe portrayal of hackers in the media has ranged from the high-tech super-spy, as in Mission Impossible where Ethan Hunt repels from the ceiling to hack the CIA computer system and steal the "NOC list," to the lonely anti-social teen who is simply looking for entertainment.
The reality, however, is that hackers are a very diverse bunch, a group simultaneously blamed with causing billions of dollars in damages as well as credited with the development of the World Wide Web and the founding of major tech companies. In this article, we test the theory that truth is better than fiction by introducing you to ten of the most famous hackers, both nefarious and heroic, to let you decide for yourself.