This action might not be possible to undo. Are you sure you want to continue?
•In reference to a system’s security, hacking is usually defined as the act of illegally entering a computer system, and making unauthorized changes to the files and data contain within (Winegarden, November 2003). •Hacker is a programming specialist who has the expertise to enter a computer or network without proper authorization (CyberAngels, November 2003)
HISTORY OF HACKING
• The History Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country’s brand new phone system by enraged authorities.
WHAT TO DO IF BEEN HACKED?
Shut Down Internet Connection The most important step to consider if you suspect your system’s security has been compromised is to shut off all connections to the internet. Although this temporarily detains us from the ability to trace the PC responsible for the attack, it does enable us to first protect our information, which is probably your primary concern. Install Firewalls Luckily, if you were followed any of the advice you have a firewall installed on our system. Many firewalls, Zonealarm for one, possess the ability of maintaining a detailed description of attempted intrusion. If your firewall does alert you to possible invasion, it probably has the capability of providing the IP address as well.
• The idea of testing the security of a system by trying to break into it is not new. Whether an automobile company is crash-testing car, or an individual is testing his or her skill at martial arts by sparring with a partner, evaluation by testing under attack from a real adversary is widely accepted as prudent. It is, however, not sufficient by itself. As Roger Schell observed nearly 30 years ago: From a practical standpoint the security problem will remain as long as manufacturers remain committed to current system architectures, produced without a firm requirement for security.
• http://www.bama.ua.edu/~wilso098/project/hacking.html • http://www.research.ibm.com/journal/sj/403/palmer.html