netwebly guide - stuff to make you feel better
infobahn


Site Overview:

Read me
Subscribe

Site Resources:
File-Sharing
Digital Workforce

Search Engines
Web Browsers

MP3 Players

MP3 Resources
Digital Music


File-Sharing:
Napster
Gnutella
Scour Exchange

FreeNet
iMesh
CuteMx

OpenNap
Aimster

MojoNation

::::
:::: :::
::from::::
:the vault:::


MP3 Law Proposed
Napster & Democracy
Death of Web Design


Bagging on
E-Commerce Trends


:::::::::::::
::::::


The new napster

Introducing:
The MSP


Are the Users
Next?


:::



:::::
:: : : :



Channels: digital music : file sharing : gnutella: napster
subscribe4free : more news ...
archives submit story


Back Orifice 2000
Posted by netwebly

Many people mistakenly assume they're fairly safe connecting to the Internet with a home computer.

Those people are wrong.

Any time your computer is connected to the Internet your system is vulnerable to a hacker attack. This is especially true for people who use a high-speed cable connection at home. There's nothing a hacker likes more than a nice fat cable connection with no security - you might as well just hang up a sign saying "Hey man. We're open. Come on in and make yourself at home."

A malicious hacker can do a lot of damage once they're inside. It doesn't require much time or thought for a hacker to erase a couple of files, duplicate a few here and there, or even leave an executable file buried somewhere deep down inside your computer. While most experienced hackers are above such things - script kiddies may not show the same restraint.

Back Orifice, one program that attracted a lot of attention when it came out a year ago, is probably the classic example of a program that lets hacker worm their way onto your computer and do pretty much what they want. Created by members of the Cult of the Dead Cow, in what the group claims was an attempt to raise awareness of security problems with the Windows Operating System, the application quickly became a favorite of hackers and one of the top illicit downloads on the Net.

Using Back Orifice, a hacker can log on to your system remotely (assuming you're running Windows) and basically do anything you could do yourself.

He could open Word and write you a poem. Take a screen shot of your desktop. Log on to your CitiBank RemoteAccess account and write checks to his favorite charities.

Plenty of food for thought, isn't it?

Although Dead Cow are quick to point that Back Orifice has it's legitimate uses: for example, it's a useful tool for Systems Administrators who need to control a computer remotely - the program represents a very real danger.

Net security companies have been quick to respond with releases that claim to detect or eradicate Back Orifice. Under the circumstances, it's a good idea to download protection - think of it as hacker insurance. To be on the safe side, you should also seriously consider using software to monitor your Internet connection.

Blackice Defender from networkice is not a firewall, but it will monitor attempts to access your connection and block unauthorized traffic.

http://www.networkice.com

 

| Add URL | netwebly.com| subscribe | feedback | digital music | file sharing | gnutella | napster | archives
© the netwebly guide 2000