Did know you that your normal, everyday e-mail could be viewed and read by practically anyone on Internet? It's like someone reading your personal mail without asking. Recently security on Internet has received a lot of attention in Press. The exploits of various "hackers" and heroic efforts of people who track and capture them have grown to soap operatic proportions.This is not without reason. As more and more companies and services come online, risk and potential damage of security breaches increases. As number of appealing targets grows, so does number of hackers. The number of poorly administered servers on Internet is staggering. Blatant security holes, bugs from old software that system administrators have failed to update, and compromised file systems are scattered all over world.
One weak server on Internet is a danger to all servers; if a hacker can attack and take over one system, he or she can use it as a base to launch attacks on other systems. The most important thing for hacker is hiding their trail. The more systems hackers can conquer, harder it becomes to trace them. It is very important that everyone on Internet spend some time shoring up their systems.
It is a simple fact of life that robbery, decryption, and embezzlement exists in our societies. It is only natural that this human trait will carry over to cyberspace. The Internet is a dangerous place. Just as it isn't always perfectly safe to go to ATM machine alone at night, it isn't always perfectly safe to send a credit card number electronically. How safe transaction actually is depends on amount of time and effort we (both customer and vendor) spend protecting ourselves.
We have lot of naive Internet users who think all thy have to do is get connected to Internet, get an e-mail address, and all is wonderful
The people who are selling Internet are basically selling vacation land with beachfront property, and lot of people are buying it. They think it's a great investment. But when they show up, it's got alligators, it's underwater, and there's yellow fever. Any user of Internet can be a victim of crime.
A lot of people are breaking into lot of systems. They are looking for information. An obvious symptom of intrusion is a change in login time showing your computer use when you were nowhere near your computer. Or, you might notice that a broad array of your files have been tampered with. Perhaps system's memory space has been changed or somebody is sending e-mails on your behalf by using e-mail address.
Crackers, as they have come to known, are people who are exploiting security laxity on Internet. They are high-tech criminals who enter systems through networks to do damage. Crackers may be thought as malicious cousins of computer hackers. Although they're not angels, hackers do not get a thrill out of breaking into someone else's computer and gobbling up information like crackers; they simply are people who are crazy about learning computer systems from top to bottom. Crackers, on other hand, have gone from snooping for thrill of it to exploiting privacy of others for monetary gain. Their crimes include financial theft, software or hardware theft, and sabotage. As more people connected to Internet, crackers are creating some real problems.