Friday 1 July 2011

hackers


ACCESSING OTHER COMPUTER WITH PASSWORD




According to(http://pcworld.about.net/news/Apr022001id45726.htm)

One click on the mouse or just putting any storage devices in the computer 
with just meter away someone can access what files and data's you are putting in to your computer even if it has a protection or password. Even if you have many a dozen of any kinds of servers that protect your network, hackers can easily access through it with just some amount of typing in keyboard or commands in it. Whatever we do hiding in our files, hackers will do anything just to get into the systems. 


Q. So can other know what files and information you are hiding in your computer?




A. Yes.


Some hackers uses a program to get into other computers for accessing it. They run the program that cracked the file sharing password with just a blink of an eye. Some uses methods to attack machine or network. The popular ones is the demon dailer (which will redial a number repeatedly until a connection is made), the wardialer (an application that uses a modem to dial a thousands of random phone numbers to find another modem connected to a computer). 

Hackers can find tools for hacking in the internet. Just only search and download it. Many sites contains a dozens of free hacking software and instructions. While understanding how these tools work well it is not just easy many files includes homegrown documentation written in hacker shoptalk. Hackers also use the net to share a list of ip addresses. the only connection of internet connected computers with unpatched security holes.





GETTING THE IP ADDRESS OF OTHER PERSON'S COMPUTER




According to (http://whatismyipaddress.com/ip-address)

An ip address (internet protocol address) is a number assigned to a network that allows the device to communicate to other network or device via internet. Also it is a set of rules that govern the internet activity and facilitate what you are doing in the internet. It governs online communication by identifying both devices and internet destinations. An ip address are consists of four number. Each of the number is consists of one to three digits. Each of the number can range from 0-255. The single dot (.) seperating each number of the digits. For example, 216.27.61.197. This numbers is the key that empowers both users to send and receive their datas over their connections, assuming that their messages and data's will reach their destination correctly. 


2 types of ip address (source) http://www.spamlaws.com/ip.html


Dynamic address


Because there are only limited number of IP addresses, it is not possible for every computer that connects to the internet to have its own permanent ip addresses. They are simply not enough to go around. That's why some computer's uses dynamic ip address. Dynamic address are temporary and are assigned each time a computer accesses the internet. They are less security risk as the computer is assigned a new IP address each time the use log's on. It is like using a payphone, you can call out and it does not matter what number you are calling.


Static address


A computer that uses a static address always identifies itself by this one permanent ip address. For example, when you access the internet and you want to visit www. youtube.com, you type this address in the browser. Your computer takes the address and ask a domain name syster (DNS) server for the corressponding IP addresses for www.youtube.com. (In this way the DNS server acts like a phone directory. Your computer then uses this address to connect to the sever of www.youtube.com. Static IP Address is always permanent it never change.


Q.
So can hacker's can know what other computer is visiting online in the internet?

A.
precisely yes.


HOW HACKERS FINDS THE IP ADDRESSES OF THE OTHER USER


Source: (http://www.d3scene.com/forum/development/3676-tutorial-how-hack-someone-knowing-his-ip.html)


Like i said earlier, Ip Addresses is a set of rules that govern the internet activity and facilitate what you are doing in the internet. So when hacker know your Ip addresses, they might know what are your informations that you put in the internet (Social networking, Blogging, etc) Getting the IP (internet protocol) of a remote system is the most important to hack an ip address. IP address is the assigned number to each computer on a network. Generally the IP of a particular system changes each time you log on to the network by dialing to your ISP and it is assigned to you by your ISP. For example 216.27.61.197 Now the first part of the numbers,
216 is the network number or  the network prefix. The second part, 27 is the Host Number that is it identifies the number of the host within the Network. This means that in the same Network, the network number is same. In order to provide flexibility in the size of the Network. Other uses HTML they get the ip addresses of that website then hack it.














No comments:

Post a Comment