Facts About Hacking and Modes of Protection from Hacking

Hacking: To gain access to (a computer file or network) illegally or without authorization.
Hacking has been around for a number of years. Even though you may not look at it as hacking, when the government spied on there own country during the 1900s, searching for communists, they used little devises to listen on peoples telephone conversations. As hacking was a good term, it was used to describe people who could push electronics past there potential.

Hacking later down the line took on a new meaning. As hacking progressed, in modern times, new viruses were made. At first they were used to help computers, so that they ran more efficiently, but these same programs were later used to create “Trojans” or “viruses” on a electronic base. At first the viruses were used as practical jokes, shutting down someone’s computer, sending them a lot of pop ups, and many other things. But as the anti-virus programs became more efficient so did the “hackers”.

Now the viruses were used top seal information, or even money. If it was electronic, it was hack-able. Now there are viruses, Trojans, key loggers, and many other “hacks”. It is recommended that you get an anti-virus program, even though you are not 100% safe from viruses, it will save you from losing anything that is valuable. Norton, or Macafe are two of the better anti-viruses programs. was used to describe people who were cheating phone companies to make long distance phone calls for free. As time went by and technologies got more advanced, the term was used to describe people who could break into computer systems and get personal or valuable data off of a computer.

As hacking progressed, in modern times, new viruses were made. At first they were used to help computers, so that they ran more efficiently, but these same programs were later used to create “Trojans” or “viruses” on a electronic base. At first the viruses were used as practical jokes, shutting down someone’s computer, sending them a lot of pop ups, and many other things. But as the anti-virus programs became more efficient so did the “hackers”.

Now the viruses were used top seal information, or even money. If it was electronic, it was hack-able. Now there are viruses, Trojans, key loggers, and many other “hacks”. It is recommended that you get an anti-virus program, even though you are not 100% safe from viruses, it will save you from losing anything that is valuable. Norton, or Macabre are two of the better anti-viruses programs.

Trojan:

A Trojan horse program has a useful and desired function, or at least it has the appearance of having such. In most cases the program performs other, undesired functions, but not always. The useful, or seemingly useful, functions serve as camouflage for these undesired functions. The kind of undesired functions are not part of the definition of a Trojan Horse; they can be of any kind.

Virus:

A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer; “a true virus cannot spread to another computer without human assistance”

Key Logger:

A software program used to record key strokes on a designated computer. Can be used for or against your liking

Modes of protection from hacking

There are most widespread means of account-hacking and ways to prevent them.

The Password-theft

Strange though, most often the account-theft happens because the player himself informs the malefactor of his access-data. You may have given your login and password to your friend whom you have quarreled afterwards. The offended friend can steal your character or hand over access-data to someone another.

Though IM internet or in our game it is easy to make virtual friends, you should beware of them. Consider isn’t someone trying to gain your confidence in order to get the data concerning your account?

Sometimes a malefactor addresses to the player on behalf of an official of support service. Remember that the real official of support service would never ask you to tell your password, so ignore such requests.

If you play in a public place (game club or internet-café) ensure that nobody is standing behind you while you are entering your password and always disable the access to your computer while you are off for some time.

The hacking of e-mail box or account on the other site

The malefactor can make an attempt to hack your e-mail box. Getting an access to your e-mail, he would use the “New password” page of our site and intercept the message with password-replacement reference and you’ll be left with nothing.

Unfortunately, often it is far easier to hack the e-mail box than our game-server. Therefore use only approved and trustworthy mail services and never hand over the access-data to your e-mail. We also recommend despite the time-economy not to save the password and always type it and login entering the system.

When you register on the other sites don’t use as login or password your game-data, it also concerns unofficial sites of AWplanet and clan-sites. Not so much because of possible malicious intent of site-keepers as because their security measures might be noticeably poorer than our.

The Password fitting

Some malefactors fit the passwords to accounts that are of interest to them by sorting out. We have the protection from such actions on our site, but the possibility of fitting password and login still remains. And the more he knows about the easier to him would be to find out the data.

In order to minimize the risk do not reveal your account-name to anyone (it shouldn’t coincide with your character name) and use complicated password, which is difficult to fit. Some ideas to invent a difficult password:

* Alternate capital and lower-case letters in random order

* Use figures instead of letters – e.g. “3” instead of “E” and “1” instead of “I”

* Try to type some word with the keyboard layout of other language. e.g. Russian word “Pезультат” will look like “Htpekmnfn”

* The ideal password is a random sequence of figures and letters, e.g. 8EHnL4K8

The trojan program

The trojan program is another way to steal your account. Yielding the stranger’s promises you download and launch some useful utility or mini-game. That is the “trojan” settles into action and is able to send any kind of your data to the malefactor or change your game-password. Not to catch up a “trojan” perform the following recommendations:

* Do not download and activate the programs from sites that are unknown to you.

* Install an antivirus program and update it regularly.

* Check on the content of viruses all the downloaded from internet programs.

The hacking of computer

The malefactor may hack your computer. His aim is to get some personal data that are stored on your hard disc. He may reach his aim by using the hole in your operating system.

To get into your computer the malefactor must know your IP-address. Each computer connected with internet has its own unique IP-address. It looks like 152.168.0.15. Your IP-address may be revealed if you use programs like ICQ or IRC, launch clients of P2P-nets. Knowing your IP-address, hacker can get an access to the files through the security-hole in your system. To avoid this keep the following recommendations:

* Download and install your operating system updates regularly

* Install firewall-program which would disable the access to your computer from internet

* Allow access only for those applications that your trust completely

* For the game you should open of the following ports: 21, 80, 443 or 2049

* Don’t leave your computer on for a long time (e.g. during the night)

* Otherwise your put it under a threat of consecutive hack

Some hackers scan all the computers throughout on the presence of security-holes and infect them with viruses and trojan programs, the more a computer is in internet, the bigger a risk of infection.

Restrict the net-access to your computer, don’t enable access to catalogs and especially to hard discs.

IP-address protection

In favor of security we recommend to install the IP-address protection. It means that access to the game and site would be permitted only from those IP-addresses that you install. To install this protection use the “IP-address protection” page. Here you can enter from one to four pairs of “IP-address/masks” which correspond to the addresses of computers by which you enter the game or site.

The IP-address of your computer may be changed and you won’t be able to enter the game. After any attempt of access from “dangerous” IP-addresses you’ll get on your e-mail a message with reference to the page on which you can change the protection-settings. This page can be used only by you yourself, the malefactor wouldn’t get on it.

If you are sure that you yourself were entering from the “dangerous” IP-address, add to the IP-address list and continue the game. If you suspect that an attempt of account-hacking took place immediately inform the support service. And, please, do not forget to indicate the IP-address involved in attempt.

0 comments:

Post a Comment

Recommend us on Google!

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More