Skip to main content

Securing your system from hackers

In my previous article "Password won't secure your system from hackers", I wrote that passwords cannot prevent someone from breaking into your computer and stealing file or something very important.

Now what can?

The hacking fight is not with you, it is with the provider or vendor of your Operating System. The developers of the these Operating Systems are working hard to map out vulnerability and patching holes through which hackers can break in. When a company like Microsoft releases an Operating System, there are always vulnerabilities, so the company doesn't stop there, they continue working to patch up these holes; in fact I  think Microsoft have its own hackers that attack the OS and find vulnerabilities before the bad minded hackers do. This process is referred to as Penetration Testing, so when these guys make their research and pent-test their Systems to map out holes and patch them up accordingly, all that is required of you is to update your system so that the security patches they worked would take effect.When I was taking my first hacking class, the easiest system I hacked with no headache and would do it again and again even if my eyes are closed was Windows Server 2003 with no Service Pack and the system was not receiving updates. Then, I still launch the same attack on my Windows 7 laptop with no updates and no Service Pack and it opened up for me like a public toilet.After installing Avast Ant-Virus, I launch the attack again and this time, Avast raised an alarm "Pan Pan Pan! Threat has been detected", but I went in anyway. But when I installed Service Pack 1, hacking my Windows 7 SP1 became totally impossible.To really attempt to secure your system from hackers, you must do the following:


  •  Join force with your OS provider by updating you system and installing updates of the software on your system regularly.
  • Turning on your OS firewall and  installing a very good Anti-Virus.
  • Configuring an Admin Account and setting a very strong password for it.
  • Mind the kind of websites you visit and the kind of links you click.
  • Setting a Bio-Level password (This allows the System to prompt for password before booting OS from any media, be it the in-built hard disk, external disk, etc.).


When a hacker try to hack into your system remotely with no success, he/she starts seeking for your co-operation and one of the way they do that is sending you links to click and the moment you click any of the links sent to you, you are hacked!, files are gone with no trace.Another way hacker can break into your system is by coming physically. All that is required is to boot kali linux from a USB stick and mount the system hard disk and Voom! files are gone again with no trace. Service Pack or no Service Pack, Anti-Virus or no Anti-Virus, this methods always work and it's my favorite, the only known way of protecting your system against this attack is by setting a Bio-Level password.

Note: Apart from stealing of files, there are other things a hacker can do such as:

  • Jamming your network (Dos Attack)
  • Deleting of files
  • Injecting  of spyware programs or even virus programs that are capable of frying your whole files.


Note that an attacker can also steal your whole system or its hard disk but this is beyond the scope of this post as I am only concerned about securing your system from a hacker who breaks in remotely or physically without moving your system.To get more list of what a hacker is capable of doing to your system, check out my upcoming post What can a hacker do to my system.

Disclaimer: The information provided here might not protect your system from a determined and a high skilled hacker, as such, you are advised to read and make more research about system security.Thanks for reading.

Comments

Popular posts from this blog

Microsoft will allow you to upgrade your pirated Windows 7 or 8 to full Windows 10 for little or no amount.

Microsoft's latest Operating System has been trending for a while now, while some are still contemplating on who gets a free upgrade from the two previous Microsoft's Operating Systems just like the company promised and who wouldn't, Microsoft has announced that the upgrade to Windows 10 would be free for genuine Windows 7 or 8 users and there is a good news for pirated Windows 7 or 8 users, they too might go to the Promised Land for free or pay a little fee.Hmmm..., with this in place, you can see how determined Microsoft is to pull everyone into its Windows 10 ecosystem. You know, when Windows 10 Technical Preview was first announced along with how it's going to operate (Windows as a Service), I thought Microsoft is finally kicking Windows Pirates out of business, but it seems Microsoft is giving them one more chance to own a genuine Windows, maybe Windows 10  is going to be "un-piratable" (let's just hope MS gets it right).Hahaha!...., before I forget,

HOW TO WRITE, COMPILE AND RUN C++ CODE ON LINUX KALI

This article is for hackers who want to develop a c++ program on Kali Linux without having to install any additional software. While some would tell you that you need to install an additional software or a compiler in order to develop a simple program in c++ on Kali Linux, I am going to show you how to develop a c++ program on this distro right out of box. Your Linux Kali comes pre-installed with a c++ compiler called g++ so we are going to write a C++ hello word code and compile it with this compiler. Before we get started, first open up terminal and run to verify if this compiler is installed on you machine: g++ -v if the compiler is pre-installed, you should get the version information of the compiler, otherwise, you should get an error. Now let's jump right in. In your terminal window, type in: nano MyCpp.cpp to create a c++ file and lunch it in nano editor for editing. When nano opens, type in the following c++ code and press Ctrl+x then y and then R

LOAN MANAGEMENT SYSTEM (My Project Idea)

There are many companies that specializes on giving loan to people; they make their profits by collecting interest on any money they lend out, and before a loan can be given to any customer, the customer must provide a collateral and some details such as:  contact details and a reference/guarantor. When the loan is finally given to the customer, they charge interest based on the the amount given to the customer for a given period of time which could be daily, weekly, monthly or yearly.  For example, a company could be collecting interest based on a particular amount for a given period of time like: $200,000 loan would have an interest tag of $2,000  per month until the money is returned, and $100,000 would have an interest of $1,000 per month until the money is returned.  In  addition, the customers need to know when the time for them to pay their interest comes e.g.  at the end of the month or the timing model with which the calculation is being made. Usually, these companies sends ou