Gadgets

Gadgets
Samsung

Internet crime and How to Overcome It


On this occasion I will share a little knowledge tiger neighbor Various Internet Crimes and How to Overcome It, with a little knowledge I have I will share with ane-ane.
neee him .......
1.    Mail bomb
 Delivery of mail bombs to an e-mail address, usually started by the personal sentiments of the owner of the e-mail address (target) with a cracker. Cracker send e-mail as much as possible to the target computer, so that the target computer system down (hang-up) for the fullness of the e-mail.
How to overcome it:

a) Consultation with the ISP (Internet Service Provider)
b) Protest to the sender and ISP sender
c) Put the filtering software on the mail server, to prevent the delivery of e-mail by crackers that have been identified.

2. Stepping Stone Assault
Computers with weak security system, often used by crackers as a springboard to attack targets (computers) Other, with a view to further obscure the trail of the cracker.

To that end, each person in charge of the computer system, is not only responsible for his system itself, but also responsible for other networks, both nearby and distant relative of the network Internet network territory. As a preventive measure, the application of the breakthrough detection system is something that is highly recommended.

3. Falsification of ID
A cracker almost certainly will never wear ID (identifitas) native has.
Cracker will try to use other people's ID, or create a fake ID in every movement.
To get the ID of others, cracker can search through The cause "trap" -an data through
network, and analyze it.

Abatement is to use a server that is supported by the customer service of the manufacturer
program is a thing that is absolutely required by internet sites, especially with high levels
high popularity. So that any weaknesses are found from a system could be immediately obtained
handling. In addition, it should also consider the selection of servers more program-makers
priority to the stability of the system rather than excess functions at the application level. Use of the system
good authentication as authentication by using a smart card (smart card), fingerprint and others,
is one way out of this problem.

4. Theft File Password or Customer Data
One way to get an ID belonging to someone else, often a cracker trying to steal files
password of a system, then analyze it. Moreover, cracker privately or
bersindikat, tried to steal confidential data of a company to be sold to rival companies.

For password file theft prevention is the prevention of use
easily guessed passwords, so even if a file is stolen, it is not too helpful. Another way is
to use the system on a system password shadowing on Unix systems, or for systems WindowNT,
Microsoft implemented encryption (encryption). Typically, server systems that handle these web services
do not use a security approach in operation. In fact, although a system
said to be strong by the manufacturer, if not supported by the security policy (regulation / wisdom
internal security) and the operation is good, it will not be able to produce a strong system. apart
The relationship with the creator of the program is one thing that is needed in building
systems that hold the attack. For the security of the data that passes through open networks such as the Internet, not
no way other than the use of encryption so that data passing can not be used by people who do not
entitled or by crackers.

5. Replacement of contents Homepage (deface)
This problem is often hit several sites in Indonesia. For example, by crackers Portuguese (in
East Timor problem) and China (about the May 1998 riots which killed many Chinese people
in Indonesia). In fact, one in Japan has HP Science Technology Agency cracked through the page replacement
HP front. In the US, a cracker never managed to get hundreds of thousands of credit card data of results
analysis program implanted in his ISP server.

To deal with this problem is usually a web admin had to work hard to restore
its website back to normal. It would be nice if a web admin always follow
news developments related to security gaps applications are used on
the web. By following the news that a web admin can always update the application
that is in use on her web so avoid defacement. Besides web admin also need to be frequently
mem backing up data, especially CERT web database, this needs to be done to start if the admin
The web is already missed so he can immediately restore the website back like
originally.

6. Program Pitfalls
Trojan Horse (Trojan horse) has been known as one cracker a very powerful technique and often
used in crimes on the Internet. Cracker provides free programs, which feature his
Nice (many functions useful program) and use easy and tasty (user friendly),
but in the program, the actual cracker 'embed' other programs that are not visible to
user. For example program for ID and password theft, theft of certain files and others.

How to overcome the main thing is to install the Fire Wall and Ativirus are always in
up date. In addition, by updating the operating system that is used to cover the hole or holes
security on their Operating System.

7. Shutdown Service
A cracker may go clicking a system hang-ups, with the aim that the target system is not
can provide service for all users. This incident ever happened to Microsoft, whose access to
his homepage by all users is denied, because the computer server creates a 'busy' itself by the cracker.

Usually the cause of this problem is located in the server program that handles a service / service
certain. The most common is the server program design did not think / consider
network security issues, so use a buffer (temporary shelter in memory / hard
disk) are not controlled and resulted server can not handle the demand for services from users
in fact. To overcome this problem, in charge of the system should always do
check the program he uses to match only trace (log) of the cryptographic
program with trail provided by the programmer.

Hope it helps and hopefully more to make us aware of the dangers merlabuh in Cyberspace, thus slightly Tips Internet Sehat.

Always be alert jikala agan was surfing the World Maya ,,,,,,,,,
Previous
Next Post »