Google Answers Logo
View Question
 
Q: how do hackers hack into personal computers via the internet? ( Answered 4 out of 5 stars,   1 Comment )
Question  
Subject: how do hackers hack into personal computers via the internet?
Category: Miscellaneous
Asked by: bluekat-ga
List Price: $4.00
Posted: 23 Dec 2003 22:20 PST
Expires: 22 Jan 2004 22:20 PST
Question ID: 289937
how do hackers hack into personal computers via the internet?

some good technical infomation a layman can understand please, and no
i dont want to hack anyone, but would like to know how easy it really
is, since we are all being convinced to buy and update antivirus and
firewall software
Answer  
Subject: Re: how do hackers hack into personal computers via the internet?
Answered By: aht-ga on 23 Dec 2003 22:47 PST
Rated:4 out of 5 stars
 
bluekat-ga:

This question is very much related to your other question regarding
the anti-virus software itself.

Unauthorized or undesired access to a PC that is connected to a
network or the Internet is usually achieved by exploiting either poor
security practices, or design problems in the operating system and/or
software being used on the PC.

Most of the time, you and your computer are rarely being directly
targeted. Rather, the virus or worm author is simply looking to get
their virus or worm onto the maximum number of PCs possible in the
shortest amount of time. So, if your PC becomes infected, it isn't
because someone is out to get you, you are simply collateral damage.

Getting into the PC is accomplished through several means. In the
past, when people used floppy disks to move files back and forth
between computers, viruses usually were transmitted via floppies.
These days, the most common path is through an e-mail attachment
(which is also the most common way that people exchange files now...
you see the trend). Viruses and worms are also transmitted through
"Trojan Horse" files traded through file-sharing networks such as
KaZaA. In this method, virus or worms place themselves in the shared
files directory of an infected PC, naming themselves after a popularly
traded file. Victims download these files thinking that they are the
actual file being sought; upon opening the file, the virus is
unleashed.

Another mechanism that is starting to become more prevalent, and
therefore a growing concern, is through a bug in a popular web browser
such as Internet Explorer. For example, recently it was revealed that
it is possible to trick Internet Explorer into displaying a false
website while appearing for all intents and purposes to be a
legitimate website (including the address displayed in the Address
field). Other documented problems with Internet Explorer will allow
the operator of the false website to download and execute programs
(such as viruses) on the computer without the knowledge of ther user.
To date, no major attempt has been made using this approach, but
security researchers know that it is now possible.

By default, your PC can be probed through a network or Internet
connection to reveal which services are running, details about your
machine and its network settings, and ways to exploit your security.
An effective firewall can prevent this.

The message here is that, no matter how cautious you yourself are in
using your computer, there are enough methods for a virus to get into
your computer that you need to equip yourself with every possible tool
to prevent infection.

If you wish to find out how visible your computer is to others on the
Internet, pay a visit to Steve Gibson's website at:

http://www.grc.com/default.htm

and scroll down to the Shields UP! link. This will lead you to the
port test tool that will show you what an educated hacker can see
about your PC.

Since your questions both question the value of purchasing and
maintaining antivirus and firewall software, I will suggest a more
economical approach.

First, consider using the free version of Zone Alarm, the leading
personal firewall. You can download this free version from:

http://www.zonelabs.com/store/content/company/products/znalm/freeDownload.jsp?lid=zadb_zadown


Second, consider using the free version of AVG Antivirus, from
Grisoft. This free antivirus software is regularly updated for the
latest virus signatures:

http://www.grisoft.com/us/us_dwnl_free.php


Please let me know if you require any clarification, and definitely
consider downloading and installing the two programs listed above if
you choose to no longer purchase and maintain the antivirus and
firewall programs that you may already be using.

Regards,

aht-ga
Google Answers Researcher

Clarification of Answer by aht-ga on 23 Dec 2003 23:06 PST
To learn more about this topic, you may also read the information found at:

http://antivirus.about.com/c/esntl.htm?PM=ss10_antivirus

In particular, you may want to read about the impact of the Blaster
virus, which hit the world hard this summer. For this virus, it was
not even necessary for the user to do anything "wrong", other than
leaving their computer connected to a network or the Internet, without
a proper firewall in place.

http://antivirus.about.com/library/weekly/aa072903a.htm

It is due to the expectation that further such exploits are possible,
that antivirus and firewall programs are necessary.

Regards,

aht-ga
Google Answers Researcher
bluekat-ga rated this answer:4 out of 5 stars
thanks

Comments  
Subject: Re: how do hackers hack into personal computers via the internet?
From: mapname-ga on 24 Dec 2003 00:53 PST
 
Google answer researcher does not really answer this person's question.
The question was how.

To answer your question I will give you most common example how they do it.

1. By default, your windows or linux computer is running a lot of
services. Those services open you to the hackers. So the very first
thing you need to do is to close/stop those services on your computer
if you are just an end user.
They use so called "buffer overflow" technique to get into your
computer through running services.

2. Email. The best thing that you can do to protect yourself is to
install the oldest email client program which only shows text and
nothing else!

3. Chat programs. 

4. Browser Exploits. You should increase the level of security in your
browser to the highest. And, also, avoid attending porno sites.

So, if your computer is not running services then hackers will try to
trick you in order to run executable and then run needed services for
them which is called "backdoor".

The best way to protect youself is to have two computers. One is
connected to the Internet. The other is not. If you have important
work to do, do it on the computer that is not connected to the
Internet.

Since the majority of the people use Windows there is no end to the
new viruses. So, we are in a loop. We all use windows and we all have
to update windows and we all have to update virus definition lists.

In order to get out of that loop, one has to come up with the new
operation system which is physically secure. Not on software level but
physically!

Important Disclaimer: Answers and comments provided on Google Answers are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Google does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. Please read carefully the Google Answers Terms of Service.

If you feel that you have found inappropriate content, please let us know by emailing us at answers-support@google.com with the question ID listed above. Thank you.
Search Google Answers for
Google Answers  


Google Home - Answers FAQ - Terms of Service - Privacy Policy