adbrite

Friday, February 18, 2011

How Your Email Id Can Get Hacked



http://houssem4dz.ifrance.com/images/Hackers5.jpgMany of you might have been victims of your email accounts being hacked, or your Facebook  password not working. This maybe because your password might have been hacked by the Hackers. Here I’ll tell you which are the different methods by which Hackers can get your passwords and also preventive measures to safeguard yourself. By knowing how hackers can get into your account, you will be in better situation to understand what are the possible ways you can lose your account information and passwords & you can protect yourself from getting hacked next time.

1. Keyloggers

This is one of the basic tool used for getting your passwords. Keylogger resides in your system memory and runs at every startup. These keyloggers log all the keystrokes you type. A log is created and then it is sent to the Hacker. Most famous keylogger is the Ardamax Keylogger. It can be customized so that it cannot be shown in “Processes” (Windows Task Manager).

2. RAT

RAT stands for Remote Administration Tool. With RAT, a hacker can connect to your PC, without your knowledge. He can see what is going on the screen, what you are currently doing, which sites you surf. It also has the built-in functionality of keylogger. Hacker can copy files from your Hard disk to his computer, and all this without your knowledge. A good example of RAT is Poison Ivy. It can be customized to connect to your PC on a particular port number specified while creating the RAT.

3. Trojan Horses

Now these are the most common type of malwares. Trojans spread through warez sites mostly. All of you want free softwares. Right? Beware though! When you download from warez sites, all the keygens and patches and even the original trial programs are trojaned. This means you will get the software for free. But your computer will be affected with a trojan horse. When you run the patch/keygen, you’ll get the desired output, but in background, your system gets infected with the trojan. Turkojan is a famous Trojan horse. A trojan is much more superior to keyloggers and RATs. It provides much more functions, so that a Hacker has more access to your PC.

How to protect yourself from hacking:

  • Install a good licensed anti-virus. I suggest you go for Kaspersky. It’s the best anti-virus out there.
  • Always have your Windows Firewall turned on.
  • Never ever trust warez sites. There is a lot of malware flowing out there.
  • Don’t run .exe programs given by anyone. Trust only yourself.
  • Never auto-play a pen drive. By this, malware automatically gets installed on your PC.
  • Don’t run attachments from emails.
  • If you want to run .exe files safely, run them sandboxed. A free application Sandboxie is available for this purpose.
  • If you feel you’re infected, format your PC immediately. No anti-virus can remove a Trojan horse from your PC. It’s very difficult to remove a trojan from an infected PC.
Hope this guide is useful. If you have any questions, ask them in Comments below.
Note: This is an informative post only for educational purposes!

Monetize your Website or Blog with BidVertiser

1 comments:

Are you trying to make cash from your traffic by using popup ads?
If so, have you considered using PopCash?

Post a Comment

thank you for visiting our site..!

clicksor

Related Posts Plugin for WordPress, Blogger...

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More