Sunday, August 24, 2008

Computer hacking.......wid current video




Hackers transform computers into zombies by using small programs that exploit weaknesses in a computer's operating system (OS). You might think that these hackers are cutting-edge Internet criminal masterminds, but in truth, many have little to no programming experience or knowledge. (Sometimes people call these hackers "script kiddies" because they are young and show no proficiency in writing script or code.) Investigators who monitor botnets say that the programs these hackers use are primitive and poorly programmed. Despite the ham-handed approach, these programs do what the hackers intended them to do -- convert computers into zombies.

In order to infect a computer, the hacker must first get the installation program to the victim. Hackers can do this through e-mail, peer-to-peer networks or even on a regular Web site. Most of the time, hackers disguise the malicious program with a name and file extension so that the victim thinks he's getting something entirely different. As users become savvier about Internet attacks, hackers find new ways to deliver their programs. Have you ever seen a pop-up ad that included a "No Thanks" button? Hopefully you didn't click on it -- those buttons are often just decoys. Instead of dismissing the annoying pop-up ad, they activate a download of malicious software

No comments: