Internet Security: Protecting Against Cyber Hackers

Learn about internet security and how you go about protecting against cyber hackers.

| October/November 2000

What you need to know about protecting against cyber hackers. 

Is it Joe or Josephine Hacker, a 15-year old kid with too much time on his hands, or a determined hacker after personal information? Hard to say. But the security experts I've talked to place the culprits in three camps.

First are thrill-seeking kids who use readily available port scanners and packet-flooding programs to swamp a computer's network software and annoy users. These recreational hackers may just want to knock your kid off the Net — the Internet equivalent of the neighborhood bully — and become first in line for a network game.

Next are system-crackers or script-kiddies who want to see what they can get away with, such as "defacing"a Web site. These folks exploit weaknesses in server software that has not been secured. Depending on their skills, they could steal your network password, disable your Web site's SSL protection (and muck with visitors to your Web site), crash your system, view and copy your network files, and more.

Finally, there are the serious and sophisticated cybercriminals who are after corporate or government information. Corporations are reluctant to reveal that their networks or e-commerce sites have been compromised for fear of driving away customers and watching their company's stock prices plummet. According to Jim Southworth, director of advanced network services and technologies at Concentric Network Corporation, you rarely hear about these hackers. "Fortunately, their attempts to infiltrate banking, credit card and government sites, while fairly common, are seldom successful," says Southworth.

Your PC may not be as big a target as a commercial site, but even a single attack can be devastatingly personal, no matter who you are, making protecting against cyber hackers a must. For example, there is an infamous program called BackOrifice, used by sophisticated hackers and others, that can tap into and record all of the activity on your PC, and even take control of it — silently.

mother earth news fair 2018 schedule


Next: April 28-29, 2018
Asheville, NC

Whether you want to learn how to grow and raise your own food, build your own root cellar, or create a green dream home, come out and learn everything you need to know — and then some!