skip to main | skip to sidebar

A TO Z ABOUT COMPUTERS

Category wise :-
  • we hate hacking (10)
  • antivirus (6)
  • windows registry (3)
  • introduction (2)
  • google (1)
  • windows files (1)

Intentional misuse of your computer

posted under we hate hacking by nandu reddy
The most common methods used by intruders to gain control of home computers are briefly described below. More detailed information is available by reviewing the URLs listed in the References section below.

Trojan horse programs

Back door and remote administration programs

Denial of service

Being an intermediary for another attack

Unprotected Windows shares

Mobile code (Java, JavaScript, and ActiveX)

Cross-site scripting

Email spoofing

Email-borne viruses

Hidden file extensions

Chat clients

Packet sniffing

source:- http://www.cert.org/tech_tips/home_networks.html

0 comments

Make A Comment

Comment Form under post in blogger/blogspot
Newer Post Older Post Home
Subscribe to: Post Comments (Atom)




nandu reddy


More Goodies @ NackVision
Blog Archive
  • 2008 (21)
  • 2007 (2)