ID:177985
Jul 4 2002, 6:44 pm
|
|
Gah, will a hacker (Yeah, King Cobra >.<) hack me if he really wants to? Erm, I mean will he get away with it? Dareb says I can call my internet provider and tell them about BYOND, King Cobra, and everything if he ever hacks me at all. Um, so would Cobra get away with it or not?
|
In response to Shadowdarke
|
|
yeah yeah yeah, I mean if i WAS hacked, could I sue him, put him in jail, or SOMETHING?
|
In response to BlueAqua166
|
|
First, you'd have to find out who he really was and if he is even a decent hacker he will cover his tracks, us IP scramblers and such. Then you have to prove that he actually did something to your computer.
I know there are laws about breaking into other peoples computers without consent (even without causing damage) so theoretically you could sue him or get him in jail but I doubt it. This is all hearsay and speculation though, you could probably find out from the government if you really wanted to. |
In response to Shadowdarke
|
|
I never use a firewall they are the ultimate placebo.
Everyone i know around this area i live can crack through them, they are like brittle crackers in todays standards. want a good defense Infect your computer with a damn virus, A resource eater. Since ive had that bastards nobody has been able to get into my computer without a direction connection |
In response to BlueAqua166
|
|
If you wake up one day and your computer is fried take it to the shop and have them try to copy over all the people who have connected to your computer, at what time, and what procedures they called for.
When a computer gets screwed it still has little bits of memory on it, a skilled technician can reclaim these bits of info, also if you wanted to if you knew how to code C++ make a personal program that prints out every direct connection made to you and all commands made, at what times they are made, from what IP. i laugh at people who say they have IP spoofers. good for them. they cant fool the computer though. if the computer ever had a false signal it wouldnt return properly and thus no signal is returned. so. the hacker is blind. think about it. IP Spoofers are just to make people feel secure, they dont actually work. aka. PLACEBO.. just like a firewall... what do firewalls do? well they prevent all unauthorized connectons by simply restricting access to all but specifically set addresses. but like everything they are programs. and they themselves can be hacked and even disabled without people even realizing it. Firewalls are no good, get a good antivirus program and enjoy. Never keep passwords or important information on computers. and Always make backups. Firewalls are more for the business oriented computers, if you just playing games they get in the way. |
In response to Dareb
|
|
Dareb wrote:
If you wake up one day and your computer is fried take it A true 'cracker' (a person who invades a computer for illegal purposes - a hacker is a good guy - heck, if you program or fix cars without professional training you could be considered a hacker) would change logs and whatever else needed to keep themselves safe. make a personal program that prints out every direct A good simple measure, but most true crackers expect this and know how to 'doctor' the logs to hide their presence. An improvement on this idea is to copy this connection log to another computer in another secure network while it is being made - an extra level of protection that is harder to defeat, harder to detect. A firm I worked at in the States use to email the log every few minutes to a private account - actually worked in catching a few intruders who tried to change logs... IP Spoofers are just to make people feel secure, they Got to disagree a bit here - an IP spoofer and firewall can be good effective deterents *IF* setup properly - which most people don't know how to do. The tool is not at fault: it is the user who does not know how to use it... Firewalls are no good, get a good antivirus program and Antivirus programs don't protect you from people who enter your computer to search for information or to plant programs on your system. A properly set up firewall that shuts off all access points except maybe http and email ports will serve you better than nothing. ALSO, paying attention to what your system is doing will help alert you to attackers... Another good tool that is gaining popularity is nmap, which can be found at http://www.insecure.org/nmap/index.html Nmap is a good tool to see where the holes in your system are, improving your chances of securing your computer or the network you are on... |
I'll tell you straight, if someone makes hacking threats about something stupid like an argument or something, then its nothing but a bluff cause they know what may happen if they do, either that, or their just retarded
|
In response to Stimulus
|
|
Stimulus wrote:
I'll tell you straight, if someone makes hacking threats Agreed, most people who claim to be hackers are riding the wave of popularity the media gives about this stuff, and they usually have very little knowledge on how to actually crack a system. True hackers/crackers don't bother with threats - they just do it... |
In response to Dareb
|
|
Dareb wrote:
If you wake up one day and your computer is fried take it to the shop and have them try to copy over all the people who have connected to your computer, at what time, and what procedures they called for. It doesn't work that way. Computers don't, as a rule, log connections like that without software in place to do so, and probably won't record all the data coming in (which would be a worse security risk to yourself). When something does connect in, it doesn't just "call" for a procedure; it connects to a specific program running on your machine. The program may be part of the OS, like the part of Windows responsible for network file sharing, or it may be something else. How that program can be abused depends entirely on what it is. When a computer gets screwed it still has little bits of memory on it, a skilled technician can reclaim these bits of info, also if you wanted to if you knew how to code C++ make a personal program that prints out every direct connection made to you and all commands made, at what times they are made, from what IP. I believe--though I'm not 100% certain--that you need a special hook into the TCP/IP drivers to do this. In Linux it's probably easier to check connections than in Windows, but there are some Windows programs that can do the monitoring for you. Tiny Personal Firewall is particularly helpful for monitoring live connections. i laugh at people who say they have IP spoofers. good for them. they cant fool the computer though. if the computer ever had a false signal it wouldnt return properly and thus no signal is returned. so. the hacker is blind. think about it. This is somewhat true, since for any two-way connection there has to be a return address. However, many denial-of-service attacks in fact rely on spoofing. It's also theoretically possible to hijack a router shared by two connections, and divert traffic back your way while making the original system see a different IP. However, this would usually require physical access to the router, so it's become a lot harder to wrangle. IP Spoofers are just to make people feel secure, they dont actually work. aka. PLACEBO.. just like a firewall... what do firewalls do? well they prevent all unauthorized connectons by simply restricting access to all but specifically set addresses. Specifically set ports, too. But overall, firewalls do work and provide a very good level of security in a simple way. There are ways around them, however, like using a buffer overflow to set up a "controlled crash" in a running program that has the ability to connect out. but like everything they are programs. and they themselves can be hacked and even disabled without people even realizing it. This isn't totally correct. Most software firewalls, if killed, would probably "fail open", to use an electronics term--that is, they'd cut off all connections. Hardware firewalls would tend to operate the same way but even more so, and it's a lot harder to hurt them. Firewalls are no good, get a good antivirus program and enjoy. An antivirus program provides post-infection protection, but it won't protect you from things that don't use mobile code attacks on your computer. For the best protection, good antivirus software and a good firewall (properly configured) are needed. Firewalls are more for the business oriented computers, if you just playing games they get in the way. This isn't really true. For cable modem users firewalls are, I think, a necessity. When people first started moving to cable ISPs, script kiddies had a field day installing trojans on unprotected machines; most of those machines could have been protected with a very simple firewall. Firewalls can get in the way of some games and other applications, but they can be configured to allow access. Lummox JR |
In response to Dareb
|
|
Dareb wrote:
I never use a firewall they are the ultimate placebo. Wow, the ultimate bad advice. If you don't want to catch a cold, kill yourself. If you don't want to trip and fall, break your own legs so you can go around in a wheelchair. To avoid sunburn, encase yourself in cement. Brilliant. The weird thing is, the logical conclusion of your line of thinking would actually work. Tape up your mouth and clasp your fingers behind your back, and you'll be a lot more eloquent. Lummox JR |
As for hacker skill, usually if they are threatening to hack you, they haven't a clue how. That is just an attempt to bluff you into doing something for them. A skilled hacker wouldn't need your consent to mess with your game, and if they did decide to hack you they wouldn't tell you about it. You'd just try to boot one day and find your bios fried.