Friday, October 17, 2008

Are you a victim of hacking, or making someone the same????


This article says that a computer hacker can turn your computer into a bomb remotely (Without getting in physical touch of the computer), but let me tell you it is absolutely false and fictious as our computer don't have any explosive parts or componentes. But yes, if you talk about a logical bomb then yes the Mighty Hackers may compromise your computer and use it to deploy attacks or perform attacks to any other remote machine connected to you and they will think and find that the attack has been performed from your own pc.




And guess what I, Amit Mishra , have got many a readymade tools and some custom tools that I have developed using Network Programming in C# that can perform such operations.

Listen, there's absolutely no need to panic at all, since a little bit of carefulness and activeness adopted by us can prevent us from being or making someone a victim of hacking.

There are basically following steps for Windows users to ensure your total security from hackers:
  1. First, never , never run an executable file(a file having an .exe, .com, .bat, .vbs extensions) that you don't know where does it come from, what it does , what's its use.
  2. Second , you must have a firewall software installed on your system, windows XP and Windows vista have this utility in built and check its configuration of exceptions (those softwares that are allowed to use network or internet). If you find any suspicious entries in exceptions then immediately remove that.
  3. In Windows XP, you can check firewall settings by opening the "Windows Firewall" setting in Control Panel.

No comments:

Post a Comment