Did know you that your normal, everyday e-mail could be viewed and read by practically anyone on
Internet? It's like someone reading your personal mail without asking. Recently security on
Internet has received a lot of attention in
Press. The exploits of various "hackers" and
heroic efforts of
people who track and capture them have grown to soap operatic proportions.This is not without reason. As more and more companies and services come online,
risk and
potential damage of security breaches increases. As
number of appealing targets grows, so does
number of hackers. The number of poorly administered servers on
Internet is staggering. Blatant security holes, bugs from old software that system administrators have failed to update, and compromised file systems are scattered all over
world.
One weak server on
Internet is a danger to all servers; if a hacker can attack and take over one system, he or she can use it as a base to launch attacks on other systems. The most important thing for hacker is hiding their trail. The more systems hackers can conquer,
harder it becomes to trace them. It is very important that everyone on
Internet spend some time shoring up their systems.
It is a simple fact of life that robbery, decryption, and embezzlement exists in our societies. It is only natural that this human trait will carry over to cyberspace. The Internet is a dangerous place. Just as it isn't always perfectly safe to go to
ATM machine alone at night, it isn't always perfectly safe to send a credit card number electronically. How safe
transaction actually is depends on
amount of time and effort we (both
customer and
vendor) spend protecting ourselves.
We have lot of naive Internet users who think all thy have to do is get connected to
Internet, get an e-mail address, and all is wonderful
The people who are selling
Internet are basically selling vacation land with beachfront property, and lot of people are buying it. They think it's a great investment. But when they show up, it's got alligators, it's underwater, and there's yellow fever. Any user of
Internet can be a victim of crime.
A lot of people are breaking into lot of systems. They are looking for information. An obvious symptom of intrusion is a change in login time showing your computer use when you were nowhere near your computer. Or, you might notice that a broad array of your files have been tampered with. Perhaps
system's memory space has been changed or somebody is sending e-mails on your behalf by using e-mail address.
Crackers, as they have come to known, are
people who are exploiting
security laxity on
Internet. They are high-tech criminals who enter systems through networks to do damage. Crackers may be thought as
malicious cousins of computer hackers. Although they're not angels, hackers do not get a thrill out of breaking into someone else's computer and gobbling up information like crackers; they simply are people who are crazy about learning computer systems from top to bottom. Crackers, on
other hand, have gone from snooping for
thrill of it to exploiting
privacy of others for monetary gain. Their crimes include financial theft, software or hardware theft, and sabotage. As more people connected to
Internet, crackers are creating some real problems.