What are the hackers?
The hackers are informatics passionate persons, which usually have a scope: “hack” codes, databases, web pages etc. They are considered offenders in the most of the World states. Their usually preferred aims are not the personal web pages, but the important systems with high protection and important information.
Once obtained, those files (information) are published on the Internet, just to be seen by everybody, or even used.
Any real hacker must respect a “hacker’s code”, which is preset and known to be respected.
There are hackers that attack random targets, anytime and anywhere. For example, the frequent attacks on Yahoo and Hotmail blocked the access to the search engines and mail accounts for some days, and brought prejudices of millions of dollars.
These attacks (a violation of the “hacker’s code”) are usually made by curious persons, which only scope is having fun. Those virtual attackers are not real hackers, because they don’t write their own nukes (“nuclear attack programs”) to be used on their attacks. They borrow the codes from the Internet or other sources.
Usually, the amateur hackers are those to be brought to justice. The reason is simple. The real hackers are usually very clever, they write their own nukes and they can fool those who want to determine the attack source.
The crackers are a certain type of hackers, specialized on cracking shareware programs or programs that needs a serial key. Those that write the programs are the only ones to be prejudiced.
There are two methods for passing the applications’ protection systems:
introducing the code that can be found on the Internet or using Oscar 2000 similar programs – provides a code library;
the second method is used for systems with advanced protection – need hardware keys (those are installed on the parallel ports of the computer and send a coded signal every time the application requires it). Those are patches – they are specially made for certain applications that once launched change the executable code.
The patches and the serial keys libraries can be easily found on the Internet.
Cracking is considered “computed piracy” and it is a serious offence. Anyway, it is very difficult to find out the source that published the patches on the Internet.
So, the hackers are writing their own codes. Some of them publish their results on the Internet, but the important codes that hack secret files aren’t so easy to find on the Internet.
Here are some programs used by the hackers:
BoGUI BackOrifice. This is a The Dead Cow Cult product, Bogui is a computer control program for the local network. Commands like System Lookup (or Restart) won’t make the aimed computer’s user happy. The only problem of this program is that all the used commands are transmitted in a package to a Trojan virus. The aimed computer is not affected by the Back Orifice attack, until it is infected.
Net Nuke. This program has a lot of versions. It sends a package of information through the network.
Mail Nukers. Those are programs that attack a mail account with a great number of messages (usually >10000). This attack blocks the mail account or closes it. Most of these kinds of programs have the option to send anonymous emails.
You can download these programs from the Internet. Unfortunately, some of them are often used to spread viruses, and can have serious secondary effects. Anyway, the abusive usage of these programs is not recommended.
Mass E-Mail hackers
This type of hackers (spammers) sends large amounts of unsolicited e-mails (or other kind of information) just to block the server. Most of the important sites, like Yahoo.com, Amazon.com etc. use filter to protect the servers. These traps are easy to avoid even by the beginners.
The prejudices brought by these attacks are up to hundreds millions of dollars. The users of these servers are also affected by spammers attack.
You may ask how spammers manage a large amount of emails in a short time without being localized. It is a simple job. For example, they manage 50 email accounts, and then the information is forwarded through several servers.
This is a list of unwanted emails:
If you are a victim of hacker’s attacks, can you say this is an important problem? There are different types of protection against attacks; the only problem is the laws are made to be broken.
Some of the protection methods can be applied by the Internet providers (ISP):
- all the unknown files on the server must be eliminated;
- packages with other header than owner’s IP addresses must be eliminated;
- scanning port denial etc.