Maintain your old Siemens Hipath system

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain. I could almost guess what it was he found. Have I been hacked?

You see, his computer had been hacked. Actually, in his case, his computer had been tagged. Similar to the image you see here.

Tag, You're It!
---------------
The file transfer protocol, commonly referred to as "FTP", has been around for many years. In the early days of the Internet, it was one of the few ways to easily upload and download files from one computer to another. Many commercial operating systems come with an FTP server installed. In other cases, the option for FTP services is selected by a user when they are installing or updating their operating system. If this service is not setup properly, or you don't have an adequately configured software or hardware firewall, it is an open invitation for a hacker or intruder.

FTP Tagging - The most common purpose for someone to compromise your FTP server is for the storage and distribution of illegally obtained software and files. This could include cracked software, stolen movies, audio files, and pornography. Removing this type of contraband from your computer can be difficult, particularly if you are using a Microsoft Windows platform. Hackers use sophisticated scripts to create a maze of directory structures to house their wares on your computer. They may use a combination of names with spaces in them, and in some cases use extended characters (characters outside the normal alpha-numeric range). Deleting these directories through normal means may be difficult, if not impossible, for the average user. Many people wind up wiping their system and re-installing it, and that is if they're lucky enough to find out their system has been compromised.

The above is a perfect example of why the statement, "I'm not worried about being hacked. What do I have that a hacker would want?" is not a good position to take. The fact is, you do have something they want, your computers resources. Why should a hacker store tons of illegally obtained files on their systems when they can use yours.

The Good, The Bad, And The Ugly
-------------------------------

The Good
--------
When I was young I use to spend hours upon hours on the Internet Relay Chat, also know as the IRC. The IRC is another method of Internet communication, which has been around for quite a long time. When I was a frequent user of the IRC, it was just plain fun. You would meet all kinds of people from all over the world. It was the instant messenger of the time.

The Bad
-------
Today, the IRC is a huge communications network. It is made up of thousands of channels, and can be accessed by pretty much any operating system platform. It is also a favorite means of communication for hackers. They can discuss new exploits, methods of compromise, and even send and receive files. Many hacker groups use a cryptic language to communicate with each other on the IRC channels. Unless you know the language constructs they use, their conversations can look like a bunch of nonsense.

There are many exploits, backdoors, and Trojans that effect, or are contained in, the myriad of IRC clients on the Internet. Making sure you choose one that's relatively safe to use is not an easy task. As an example, take a look at this list of IRC safety and security info at irc.org.

The Ugly
--------
It's not just the exploits and security risks associated with using the IRC, which need to concern you. If a hacker is able to install an IRC relay agent on your computer, it can become a conduit through which they communicate and distribute information. In my line of work, I've identified many systems with IRC backdoors or relay agents installed. The only thing the end user typically experiences is a decrease in system performance and Internet access.

Just Open The Door And Let Them In Peer-to-Peer File Sharing
----------------------------------
If a total stranger were to knock on your door, and ask to come in to just hang out for awhile, would you let them in?; Most likely not. If you're using peer-to-peer file sharing software to locate and download files on the Internet, you're opening the door to destruction. Many of the file sharing services and software available on the Internet now tout themselves as being "safe" and "clean". This is as far from the truth as you can get. If you're a regular user of these services, the chance of your computer being back-doored or hacked is significant.

If you have anti-virus software installed (and up-to-date), you've undoubtedly received messages regarding viruses when downloading files from peer-to-peer services. These are not the only things you could be downloading. Many hackers imbed root-kits in files and distribute them using peer-to-peer file sharing. Root kits contain many types of tools used by hackers to gain control over computers. If the installation of the kit on your computer goes undetected and is successful, it's only a matter of time before your computer is completely compromised.

I can't tell you how many times I've found company employees (and technical personnel) using peer-to-peer file sharing services. Any organization that permits this is putting itself at risk. And, the risk is much greater as compared to a single home computer because of the number of potential internal targets.

Conclusion
----------
Of course, the above is just a few examples of different methods and types of computer compromise. There are many ways your computer can be hacked. Your best defense is a good offense along with education and awareness. When you configure your computer make sure you enable only the software and services that you need. Many programs have known exploits and / or require additional steps be taken to adequately secure them.

Don't make the assumption that you are not a target just because you don't think you have anything of interest on your computer.

If our computer becomes unstable or dramatically decreases in performance, don't assume it's just a quirk or that it's time to upgrade.

Make sure you have a software or hardware firewall in place to protect you from the Internet. Your firewall should be configured not to allow anonymous inbound access from the Internet. This is the default configuration for most firewalls, but you should make sure the one you are using is properly configured.

Make sure you have adequate virus and spyware protection, and your pattern signatures are up-to-date. Many anti-virus applications work on a subscription basis. It's not uncommon to find out your subscription expired. If it is expired, your software may not protect you from new and emerging threats.

And, do what ever you can to stay away from any type of Internet peer-to-peer file sharing service. No matter how safe the developer claims it is.

About The Author
----------------
Darren Miller is an Information Security Consultant with over sixteen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals. Darren is a staff writer for http://www.defendingthenet.com and several other e-zines. If you would like to contact Darren you can e-mail him at Darren.Miller@ParaLogic.Net or DefendTheNet@ParaLogic.Net.

If you would like to know more about computer security please visit us at our website. If someone you know has sent you this article, please take a moment to visit our site and register for the free newsletter at Newsletter Subscribe.

Original URL
------------
http://www.defendingthenet.c om/NewsLetters/HaveYouBeenHacked.htm

In The News:

US delivery of long-range missiles to Ukraine could prove pivotal - but has been controversial
Fri, 22 Sep 2023 19:25:00 +0100
They have a catchy name. They’re called "attack'ems".

Ukraine's super gran: 'I went into the wolf's lair to save my grandson'
Sat, 23 Sep 2023 01:01:00 +0100
"I was going into the wolf's lair but I had to overcome my fear because I was the only one who could rescue my grandson."

Top X boss in India 'resigns' - amid court battle over content removal
Sat, 23 Sep 2023 07:32:00 +0100
Social media platform X's most senior employee in India has resigned ahead of the country's elections, as the company fights the government in court over content removal, according to the Reuters news agency.

After Russia's illegal invasion of Ukraine, is the UN still fit for purpose? | Sean Bell
Sat, 23 Sep 2023 01:01:00 +0100
The United Nations was conceived at the end of the Second World War with the primary objective of maintaining international peace and security.  

'Our fight is the global fight': Spain and Sweden teams unite as World Cup kissing scandal rumbles on
Fri, 22 Sep 2023 22:56:00 +0100
Sweden joined Spain's players in a show of solidarity ahead of their Women's Nations League clash as the scandal surrounding Spanish football rumbled on.



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More