Skip to main content

Securing your system from hackers

In my previous article "Password won't secure your system from hackers", I wrote that passwords cannot prevent someone from breaking into your computer and stealing file or something very important.

Now what can?

The hacking fight is not with you, it is with the provider or vendor of your Operating System. The developers of the these Operating Systems are working hard to map out vulnerability and patching holes through which hackers can break in. When a company like Microsoft releases an Operating System, there are always vulnerabilities, so the company doesn't stop there, they continue working to patch up these holes; in fact I  think Microsoft have its own hackers that attack the OS and find vulnerabilities before the bad minded hackers do. This process is referred to as Penetration Testing, so when these guys make their research and pent-test their Systems to map out holes and patch them up accordingly, all that is required of you is to update your system so that the security patches they worked would take effect.When I was taking my first hacking class, the easiest system I hacked with no headache and would do it again and again even if my eyes are closed was Windows Server 2003 with no Service Pack and the system was not receiving updates. Then, I still launch the same attack on my Windows 7 laptop with no updates and no Service Pack and it opened up for me like a public toilet.After installing Avast Ant-Virus, I launch the attack again and this time, Avast raised an alarm "Pan Pan Pan! Threat has been detected", but I went in anyway. But when I installed Service Pack 1, hacking my Windows 7 SP1 became totally impossible.To really attempt to secure your system from hackers, you must do the following:


  •  Join force with your OS provider by updating you system and installing updates of the software on your system regularly.
  • Turning on your OS firewall and  installing a very good Anti-Virus.
  • Configuring an Admin Account and setting a very strong password for it.
  • Mind the kind of websites you visit and the kind of links you click.
  • Setting a Bio-Level password (This allows the System to prompt for password before booting OS from any media, be it the in-built hard disk, external disk, etc.).


When a hacker try to hack into your system remotely with no success, he/she starts seeking for your co-operation and one of the way they do that is sending you links to click and the moment you click any of the links sent to you, you are hacked!, files are gone with no trace.Another way hacker can break into your system is by coming physically. All that is required is to boot kali linux from a USB stick and mount the system hard disk and Voom! files are gone again with no trace. Service Pack or no Service Pack, Anti-Virus or no Anti-Virus, this methods always work and it's my favorite, the only known way of protecting your system against this attack is by setting a Bio-Level password.

Note: Apart from stealing of files, there are other things a hacker can do such as:

  • Jamming your network (Dos Attack)
  • Deleting of files
  • Injecting  of spyware programs or even virus programs that are capable of frying your whole files.


Note that an attacker can also steal your whole system or its hard disk but this is beyond the scope of this post as I am only concerned about securing your system from a hacker who breaks in remotely or physically without moving your system.To get more list of what a hacker is capable of doing to your system, check out my upcoming post What can a hacker do to my system.

Disclaimer: The information provided here might not protect your system from a determined and a high skilled hacker, as such, you are advised to read and make more research about system security.Thanks for reading.

Comments

Popular posts from this blog

HOW TO WRITE, COMPILE AND RUN C++ CODE ON LINUX KALI

Developing a C++ Program on Kali Linux Without Installing Additional Software This article is for hackers who want to develop a C++ program on Kali Linux without installing any additional software. Some might say you need to install a separate compiler or extra tools to write and run a simple C++ program on Kali Linux. However, I’ll show you how to do it right out of the box. Pre-installed C++ Compiler in Kali Linux Kali Linux comes with a pre-installed C++ compiler called g++ . We will use this to write and compile a basic "Hello, World!" program. Step 1: Check if g++ is Installed Open your terminal and run the following command: g++ -v If the compiler is installed, you should see version details. If not, you will get an error message. Step 2: Create a C++ File In your terminal, type: nano MyCpp.cpp This will create a C++ file and open it in the Nano editor. Step 3: Write the C++ Code Once Nano opens, enter the following C++ code: #include <...

HOW TO INSTALL BLOGENGINE.NET WITH VISUAL STUDIO.

Yes there are lots of article on the internet that already describes how to do this, but that wont stop me from sharing my own idea on how I got mine rocking with visual studio 2012. Now here is the story, I woke up one morning and discovered I was departing from being a beginner programmer to a programmer who is at least worthy to be called a programmer. So I felt I needed to share my programming experience and the only known way I could do that, was to start blogging, hmmm... Just like you, I didn't like blogger, I needed  to be my own boss. So, I started my own blog project, but wait....  Why was I doing that when there are open source blog projects being developed and maintained by developers who are more "programmatically" experienced than I?. BlogEngine was the one I chose and the installation was a breeze. All I did was go to the site, downloaded the first zip file which is tagged "web", extracted it to my visual studio project directory, opened vi...

LOAN MANAGEMENT SYSTEM (My Project Idea)

There are many companies that specializes on giving loan to people; they make their profits by collecting interest on any money they lend out, and before a loan can be given to any customer, the customer must provide a collateral and some details such as:  contact details and a reference/guarantor. When the loan is finally given to the customer, they charge interest based on the the amount given to the customer for a given period of time which could be daily, weekly, monthly or yearly.  For example, a company could be collecting interest based on a particular amount for a given period of time like: $200,000 loan would have an interest tag of $2,000  per month until the money is returned, and $100,000 would have an interest of $1,000 per month until the money is returned.  In  addition, the customers need to know when the time for them to pay their interest comes e.g.  at the end of the month or the timing model with which the calculation is being made. Usua...