Results 1 to 6 of 6

Thread: How to protect from different internet attacks

  1. #1
    Join Date
    Nov 2009
    Posts
    866

    How to protect from different internet attacks

    I need some protection techniques from the various types of attacks from internet. Like what does a zombie do and how to get protected from it. The other thing is raw force hacking and phishing in the same manner. I need some detailed information on the same. What does this attacks actually do in the system and how to prevent them.

  2. #2
    Join Date
    Apr 2008
    Posts
    3,424

    Re: How to protect from different internet attacks

    A zombie is a PC almost certainly poorly protected and which has been contaminated by a virus or worm. This program allows a malevolent hacker to take remote control of the PC and use it to send mail, attack other machines, etc. An attacker can trigger a DOS attack if it has control of a large number of zombie machines.

  3. #3
    Join Date
    May 2008
    Posts
    3,516

    Re: How to protect from different internet attacks

    The raw force hacking is to go there in the most basic and most atrocious manner on a form of identification. The principle is to locate a login, preferably with elevated privileges on the target system and try all possible passwords. There are mainly 2 methods. The first is based on a dictionary of passwords more frequently while the second pass through all possible combinations. This attack can come from one or more machines attacking. By counting the number of failed login attempts. Reached a predefined threshold, the account is disabled. If the owner wants to reactivate it passes through a reactivation process with email confirmation you can protect yourself.

  4. #4
    Join Date
    Apr 2008
    Posts
    3,339

    Re: How to protect from different internet attacks

    Phishing is a method or procedure used by hackers to acquire secret or private information in sequence from the users (such as bank information, for example). This method is not necessarily very technical in itself, it relies mostly on Social Engineering. To do this, hackers imitate a trusted organization (bank type), and send mails to victims in claiming such and such problems, and fill a form with sensitive information.

  5. #5
    Join Date
    Jan 2006
    Posts
    4,221

    Re: How to protect from different internet attacks

    Other techniques more advanced than the form by mail, exist as the theft of content. In this case, hackers created a website, identical in all respects with the official website. The email is then simply click on a hyperlink redirecting this famous site, where we therefore ask the user to enter confidential information which will be obviously be recovered by the attacker.

  6. #6
    Join Date
    Jan 2006
    Posts
    3,792

    Re: How to protect from different internet attacks

    First you must know that no bank or using and influencing data confidential request for information by mail. Then, you should never click on a link in an email, it is preferable to refer oneself address in the address bar. When entering sensitive information (eg banking), be sure to check that the protocol is https, and also check the validity and origin of the certificate used. Some tools and utilities (eg toolbar) for Internet browsers exist, to protect themselves from phishing including checking the URL.

Similar Threads

  1. Does Panda security protect against metasploit attacks
    By servan$ in forum Networking & Security
    Replies: 7
    Last Post: 04-02-2012, 05:22 PM
  2. How to use internet explorer 9 to avoid cross-site scripting attacks?
    By Orochimaru in forum Technology & Internet
    Replies: 6
    Last Post: 15-03-2011, 10:19 AM
  3. Replies: 5
    Last Post: 09-08-2010, 02:09 PM
  4. some web application firewall to protect against hacker attacks
    By zjanetblazp in forum Networking & Security
    Replies: 5
    Last Post: 06-05-2010, 07:21 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,540,983.57788 seconds with 17 queries