Sins of The Internet: Pagejacking

Written by Richard Lowe


One ofrepparttar most frustrating events you can experience as a webmaster or writer is finding your work has been copied without your permission. I'm sure that just about every writer and every webmaster has been horrified to find his own work somewhere else under a different person's name. The thankfully few times it has happened to me I felt a mixture of blind fury and complete hate.

Sometimes thieves don't stop there. They don't steal a web page or two and claim it as their own (this is merely a copyright violation and a completely unethical thing to do). No, what they do is steal a web page and claim it is YOURS, but with modifications. In other words, they create a web page which is exactly like yours, with some changes to do something undesirable.

Once they have added your page to a different site and made their changes, they submit it to search engines, advertise it in ezines and do all ofrepparttar 132066 other standard promotional techniques. They may also register similar domain names to try and fool people into going to their illegal site. Their purpose is to steal your traffic, directing it instead to their own web site (copies of your pages).

Why do they do this? Well, let's say you have a page which is attracting a heck of a lot of visitors. You are making quite a bit of money fromrepparttar 132067 affiliate links on that page. An unethical person might make a copy of that page on their own web site, and replace all of your affiliate links with his. Anyone clicking on those links would be generating money forrepparttar 132068 pagejacker, not you.

Another common thing done by pagejackers is to add dozens or even hundreds of links to pornographic sites, many of which pop up automatically. Each time one of these links is displayedrepparttar 132069 pagejacker gets paid a small amount, sorepparttar 132070 more popups they displayrepparttar 132071 more money they make.

Honeypots

Written by Richard Lowe


A honeypot is a special computer system set up forrepparttar specific purpose of attracting hackers. Generally, these servers will be placed inside a firewall (although they might be outside) and contain specific, known vulnerabilities which allow hackers to gain access. Once inside, a good honeypot contains an immense amount of seemingly attractive targets and information to attempt to causerepparttar 132063 hacker to spend time onrepparttar 132064 system. Whilerepparttar 132065 hacker is spending this time, he is being carefully observed and traced.

There are several reasons for creating honeypots.

- They are often simply a way to get hackers to expend time and energy on non-production systems. Because it appears torepparttar 132066 hacker that he's on a "real" system, there's a good likelihood that he may just stop looking aroundrepparttar 132067 rest ofrepparttar 132068 network. In other words he's already got what he came for.

- A honeypot is a great way to test security. Let's say you produced a new security product and you want to see if it's solid. You could set up a honeypot behind this product,repparttar 132069 "leak" it's existence to some hackers. Now sit back and see if they get through your defenses.

- Another reason for a honeypot is to attempt to get a hacker to stay long enough so that you can identify him.

- Asrepparttar 132070 hacker works his way throughrepparttar 132071 honeypot system, he will leave traces and his movements will be tracked. This can all be saved for use in criminal trials at a later date.

In my experience, a honeypot is an extremely useful part of security management. What I've seen others do is simple. Recycle some older computers, not really useful for production anymore, and install some "cool" applications and documents. Add some reasonable security with a few known holes, and make surerepparttar 132072 system makes itself known onrepparttar 132073 network.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use