Google

Friday, September 14, 2007

Identifying Different Types Of Hacks


Meny Methods and tools exists for locating vulnerabilities, exploits and compromising systems.
Trojans,Rootkits,Backdoors,sniffers and SQL injection Is the common terminologies. Those
Techonologies and Attacks are co-releated.


Most hacking tools exploit weaknesses in one of the following four areas:

Operating systems : Many systems administrators install operating systems with the
default settings, resulting in potential vulnerabilities that remain unpatched.

Applications : Applications usually aren’t tested for vulnerabilities when developers are
writing the code, which can leave many programming flaws that a hacker can exploit.

Shrink-wrap code : Many off-the-shelf programs come with extra features the common user
isn’t aware of, which can be used to exploit the system. One example is macros in Microsoft
Word, which can allow a hacker to execute programs from within the application.

Misconfigurations : Systems can also be misconfigured or left at the lowest common security
settings to increase ease of use for the user, which may result in vulnerability and an attack.
...............I will discuss on each topic on my next post.
Thats All guys...

Tuesday, September 4, 2007





This blog describes how security can be achieved through design and engineering. See my another article for an alternative approach that describes computer security exploits and defenses..................