Why You Need Intrusion Detection

Expert Advice on Keeping Your Network Safe by Blocking Dangerous Hacker Attacks
The stories go on and on about another individual having their personal information stolen from their computer by some hacker. While it is true that hackers do get people's information, and they will keep on getting that information,
it is also true that having intrusion detection software can help. And even better, to be hacker safe intrusion prevention system is by the same software.
Why You Need Intrusion Detection
Doors can be opened to hackers in varied ways. Two of the most common ways by which they can gain access to your computer is simply through emails, or Web pages that you visit that have spyware, or trojans (a file which looks innocent, but actually will later open doors to a hacker) attached to them. Other ways are robot spiders sent out over the Internet to find unprotected computers, and open doors. Some say that every computer attached to the Internet may be attacked by such a spider as many as 50 times each day. So, if you do not have an intrusion prevention system in place, up-to-date, then you may have regular unexpected visitors - and you may not even know it. Others say that 9 out of 10 computers have some sort of spyware, or malware on them. Could you be one of them? This article will show you what is available on the market for your protection - and much of it can be obtained for free.

The spider robots work automatically - looking for and identifying computers on the Internet that have doors, or ports, open to them. This information is then reported back to the hacker - knowing which computers to target - and which port to use. For this reason, every now and then, Microsoft will come out with a new patch for Windows, in order to close some faulty door that hackers have discovered and been using.
What Is Intrusion Detection?
Network Intrusion detection software is a must-have these days. Each company's software will vary somewhat (for copyright and originality purposes), but you do need one for your own network, or home computer. It differs from a firewall in that the purpose of a firewall is to stop unauthorized external contacts with your system. These offer hacker prevention largely for contacts from outside the network. Most of these will now notify the owner or network controller of intrusion attempts. Network intrusion detection systems, on the other hand, will give you warnings about events that take place within the network itself.

HISTORY OF HACKING AND ITS SECURITY

                           Hacking is not limited to computers.
The real meaning of hacking is to expand the capabilities of any electronic device; to use them beyond the original intentions of the manufacturer. As a matter of fact, the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains. They wanted them to perform faster and more efficiently. So, is hacking always bad? Not really. It only depends on how to use it. But it wasn't until a group of these hackers decided to exert their knowledge in the computer mainframes of the MIT.

During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. Within these group of people, a phreaker became famous because a simple discovery. John Draper, also known as Captain Crunch, found that he could make long distance calls with a whistle. He built a blue box that could do this and the Esquire magazine published an article on how to build them. Fascinated by this discovery, two kids, Steve Wozniak and Steve Jobs, decided to sell these blue boxes, starting a business friendship which resulted in the founding of Apple.

By the 1980's, phreaks started to migrate to computers, and the first Bulletin Board Systems (BBS) appeared. BBS are like the yahoo groups of today, were people posted messages of any kind of topics. The BBS used by hackers specialized in tips on how to break into computers, how to use stolen credit card numbers and share stolen computer passwords.

It wasn't until 1986 that the US government realized the danger that hackers represented to the national security. As a way to counteract this menace, the Congress passed the Computer Fraud and Abuse Act, making computer breaking a crime across the nation.

During the 1990's, when the use of the internet widespread around the world, hackers multiplied, but it wasn't until the end of the decade that system's security became mainstream among the public.

Today, we are accustomed to hackers, crackers, viruses, Trojans, worms and all of the techniques we need to follow to combat them.

Top Ten Credit Card Safety/SECURITY Tips

There are hundreds of credit cards scams that enable the wrong people to gain your account and identity information. Identity theft is a major problem and can be avoided using these ten simple safety techniques for credit card use.

1. Watch where you shop. It is important to be aware of store policies when it comes to credit card use. How is your information protected? Are the systems used to process payment information secure?

2. Shred all information received from the credit card company. With the high instances of identity theft occurring throughout the country it is essential to take measures to avoid allowing others to view personal information.

3. When shopping online, ensure that only safe and secured websites are used for the purchases of gifts and other items. A locked padlock should be seen in the internet browser to ensure the maximum safety measures are being taken.

4. Use automated banking machines at the bank over machines located at convenience stores and within malls. Using these bank machines reduces the risk of identity theft from information being scanned as the card is swiped through the banking machine.

5. Report a card lost or stolen immediately after the card has been discovered lost or the information has been stolen. The credit card company can immediately place a hold on the account, as well as any purchases made through the account can be protected under purchase protection.

6. Ensure credit cards are signed the moment that they are received and activated. Signing the credit card reduces the chance of the card being used in a case of identity theft.

7. Keep account numbers written in a safe place that cannot be accessed by others. Credit card account numbers should not be written within the wallet, or any other area where they can be easily accessed.

8. Never lend credit cards to anyone or allow anyone to use the number to make purchases over the telephone or the internet. It is important to be aware of all credit card activity and prevent future use of card information.

9. Check your account statement each month for regular and periodic use. Customers that check the account statement are more likely to catch identity theft before it becomes devastating to the card holder.

10. Don’t keep extra copies of credit cards in the house, unless they are in a safe, under lock and key. An extra credit card can be couriered to the card holder in as little as a day – therefore it is important to avoid keeping excess copies of the credit card at home.

We can Trace a Stolen SIM Card of any mobile phone....

All information about your cell phone is stored on a SIM card inside your phone. This is the card cell phone companies
program when you first activate your cell phone. When your cell phone is stolen, the SIM card is often the only way to trace the phone’s location.

Tracking your stolen cell phone through the SIM card is mainly done through your cell phone provider. As soon as you realize the phone has been stolen, call your cell phone provider. Provide them with your account number, cell phone number and approximate time the phone was stolen. They can then track the phone’s activity. If the SIM card has not been changed out, this will help the cell phone company lead authorities to your phone’s location.

If GPS is enabled on your cell phone, you may be able to monitor your cell phone’s location from home. This will require the cell phone to be turned on and the SIM card active. Open the web page you use to access the GPS locator on your phone. Call authorities as soon as you have a set location.

Try calling your cell phone. Some thieves will actually answer the phone. The call will provide a way for your cell phone provider to track the last known location. Authorities may also be able to provide this service as well.

If the SIM card has already been changed out, finding the cell phone itself may be impossible. However, your cell phone provider can still attempt to trace the location of the SIM card. When the cell phone number assigned to the SIM card’s serial number no longer match, this alerts the provider to the theft. They will then be able to trace the stolen SIM card through the new cell phone number.

New applications are being created that work silently to track the SIM card and cell phone. These applications run quietly to prevent alerting the thief to their presence. One such application is Smart Phone Guard. The application hides itself the moment the SIM card is replaced. A message is then sent to friends’ numbers. The numbers are determined at the time the application is installed. The application also allows you to remotely delete any personal information such as photos and videos remotely through one of the friend’s numbers.

Check with your cell phone provider for other applications that may be able to trace the location of stolen SIM cards. These applications will give you peace of mind that no matter what happens to your phone, you’ll still have control. For older phones, newer applications may not be compatible.

In the event your SIM card or cell phone is stolen, report the incident immediately to your cell phone provider. This will prevent unauthorized calls and charges to your account. For many thieves, once the phone is deactivated, they simply discard the phone. Ask your provider to trace the SIM card if possible. GPS enabled phones can also be tracked through the SIM card and phone number. There are several different ways to trace a stolen SIM card with new methods being developed daily.

Pak criminals hack into 40-50 Indian sites a day'

New Delhi, Nov 12: Exposing the lack of cyber security  in India, an 'ethical hacker' has revealed the Pakistani cyber criminals manage
to deface 40 to 50 Indian sites every day.

In the war that has been on since 2001, the Pakistani criminals are able to easily break into Indian cyberspace, while their Indian counterparts can only deface about 10 to 15 Pak websites in retaliation, Ankit Fadia told Business Standard.


"Terrorists are using the most advanced technologies for communicating with each other, which include VoIP (voice-over Internet protocol), hiding messages inside photographs, draft emails and encrypted pen drives," the 18-year-old added.

Fadia pointed out that even though India is the global IT capital, the country has to still go a long way when it comes to cyber security.

"Though we have enacted cyber laws, there is not much awareness in the country about security risks arising from cyber attacks nor is there any proper training for law enforcing agencies to deal with the crime," Fadia said in another interview with a news agency.

Fadia is an independent computer security and digital intelligence consultant. He has also worked with the CBI to trace the addresses of 15 Pakistani hackers who posted anti-India messages on websites they broke into.

      SO PLEASE STOP SUCH ACTIVITY AND MAKE WORLD BEAUTIFUL IN ALL ASPECT----AJEET