P C. owners are constantly at risk from attacks by hackers. Spy ware, viruses, trojan horses, and all sorts of other malevolent programs are all trying to take control of your computer.What can we do about it? How can we be sure that we are properly protected against them?
A hacker will generally not be interested in doing damage to your PC. His main interest is in gaining control over your computer so that he can use it to send out hundreds and thousands of e-mails in your name with intention of crashing your mail server.
This can get you into very serious trouble with server. This is something that you do not want. How are you going to prove that you were not to blame?
How do hackers do it? What tools do they use?
A port scanner. What is a port scanner? A port scanner can locate PCs that are online and checks them for an open port. A hacker using a program such as ‘Super Scan’ can find an open port to gain entrance to your computer. Once in, he can use your computer as if it were his own. The only difference is that to all intents and purposes it is you that is causing all of trouble.
The main port that hacker is interested in is port 80. This is one that you use to log on to internet.
I am not going to confuse you with all various programs that are designed to show you what ports are open at any particular time. What you need to know is how to protect your computer against these attacks.