P C. owners are constantly at risk from attacks by hackers. Spy ware, viruses, trojan horses, and all sorts of other malevolent programs are all trying to take control of your computer.What can we do about it? How can we be sure that we are properly protected against them?
A hacker will generally not be interested in doing damage to your PC. His main interest is in gaining control over your computer so that he can use it to send out hundreds and thousands of e-mails in your name with
intention of crashing your mail server.
This can get you into very serious trouble with
server. This is something that you do not want. How are you going to prove that you were not to blame?
How do
hackers do it? What tools do they use?
A port scanner. What is a port scanner? A port scanner can locate PCs that are online and checks them for an open port. A hacker using a program such as ‘Super Scan’ can find an open port to gain entrance to your computer. Once in, he can use your computer as if it were his own. The only difference is that to all intents and purposes it is you that is causing all of
trouble.
The main port that
hacker is interested in is port 80. This is
one that you use to log on to
internet.
I am not going to confuse you with all
various programs that are designed to show you what ports are open at any particular time. What you need to know is how to protect your computer against these attacks.