Among the vicious attacks on computers are the attacks, which come daily from Spyware called Hackers. A relatively new term used by some in the computer protection business is the term Hacktivism. This term identifies a category of Spyware, used for vicious and unconscionable attacks on computers for a political reason.
What Is a Hacker And Which Are Their Objetives?
Hacktivism is a derivation of the word hack, meaning to chop, cut, trim or break up something crudely, roughly or irregularly with the intent to do damage. A hacker is both the one who does this and the object with which this is accomplished. The object is the Spyware developed to do the hacking. The hacker is the skilled technician who develops an application aimed at entering a computer and doing damage to the person and the computer. The Spyware as the hacker is an application, which attaches to the system and does the damage. Hacktivism then is the act of hacking into a computer for the purpose, of breaking it or doing damage to it or the owner by stealing or distorting files, information data or in some cases the system, in whole or in part for a political reason.
The Types Of Hackers…
There are two types of hackers, a white hat hacker and a black hat hacker. A hacker is a person usually “unauthorized” to access another person’s computer system seeking to find vulnerabilities in your system. Vulnerabilities or deficiencies in an Internet Browser, through, which Spyware can enter your computer. This is why it is essential to check with your browser provider regularly for security updates and install them. Always respond to notices from Microsoft, Mozilla or whatever Browser you use, when there is an update available.
One who hacks into another’s computer for a malice reason, curiosity or criminal intent for a political reason is committing the crime of hacktivism. The person is a black hat hacker who may enter a website and deface or distort information by changing the content. This person may also inhibit communication by freezing a computer or the hacker may prevent communication by a service denial message. This is hacking committed by a Cracker; a cracker is a hacker acting with malicious intent.
A black hat hacker is a person who is unauthorized to access a computer system and does so with illegal intent. The black hat hacker intends to use the information to do harm to your computer or steal your personal information. The purpose of a security system is to prevent these events from happening and to gather information on the black hat hacker and add it to the blacklist in the security program. This permits the security program to block this hacker in the event he or she tries again.
How To Be Secure
Even though many people think that hackers are incredible smart people, the majority of them are people known as “lamers”, who only talk about it but are unable to break into real systems. The majority of hackers use tools created by others, exploit weak passwords or take advantage of naive people.
Here are 3 easy steps to make hackers attempts much more difficult:
- 1. Use different passwords at each and every site you visit.
This is because hackers may create false applications or websites to get passwords. If you use one password for each different service, your security would be much better.
- 2. Stay current with all patchs from all software you use from all vendors.
Remember that your security must not be perfect, only secure enough to make your potential attackers go for a much more easy target than you to be relatively safe.