Thursday, 30 June 2016

How to protect your computer from hackers?


Computer hacking is a crime most importantly
how to survive it?



Here’s a security update to haunt your dreams, and to make the FBI’s quest for un-exploitable cryptographic backdoors look all the more absurd: a team of Israeli researchers has now shown that the sounds made by a computer’s fan can be analyzed to extract everything from usernames and passwords to full encryption keys. It’s not really a huge programming feat, as we’ll discuss below, but from a conceptual standpoint is shows how wily modern cyber attackers can be — and why the weakest link in anysecurity system still involves the human element.
In hacking, there’s a term called “phreaking” that used to refer to phone hacking via automated touch-tone systems, but which today colloquially refers any kind of system investigation or manipulation that uses sound as its main mechanism of action. Phone hreakers used to make free long distance phone calls by playing the correct series of tones into a phone receiver — but hreaks can listen to sounds just as easily as they can produce them, often with even greater effect.

That’s because sound has the potential to get around one of the most powerful and widely used methods in high-level computer security: air-gapping, or the separation of a system from any externally connected network an attack might be able to use for entry. (The term pre-dates wireless internet, and a Wi-Fi-connected computer is not air-gapped, despite the literal gap of air around it.)

How to Protect Your Computer
The same advice parents might deliver to young drivers on their first solo journey applies to everyone who wants to navigate safely online. A special agent in our Cyber Division offered the following:
  • Don’t drive in bad neighborhoods.
  • If you don’t lock your car, it’s vulnerable; if you don’t secure your computer, it’s vulnerable.
  • Reduce your vulnerability, and you reduce the threat.




Here are five simple, but critical steps to protect your computer:
  1. Install Firewall.
  2. Install Antivirus Software.
  3. Install Anti-Spyware Software.
  4. Use Complex and Secure Passwords.
  5. Check on the Security Settings of the Browser.


  • 0Blogger Comment
  • Facebook Comment

Leave your comment

Post a Comment