Stupid Ways People are Being Hacked!. Pasha Naserabadi

Читать онлайн книгу.

Stupid Ways People are Being Hacked! - Pasha Naserabadi


Скачать книгу

      The answer to this question is very easy. At the time of signing up, you have to introduce an email address, which will be used for password recovery in future.

      In fact, if you forget your password, you can ask the site or application to email it to you. Now, if a person presenting your email pretends that they have forgotten their password, they will receive a new password in your email!

      If you are managing a website and someone has access to your email, it is possible for them to send an email to the company providing your domain and hosting services and ask them to give him or her a new password.

      These are just some of the dangers that may threaten us in cyberspace.

      How to fight back?

      Although there are tools to fight against some of these dangers, even having the most powerful and the most updated security software cannot stop hackers.

      We can say that it is almost possible for anyone to get hurt by cyber-attack. Therefore, everybody should be aware of methods that might put them at risk of cyber-attack.

      How can hackers find your password?

      Frankly, it depends on the hackers’ conditions and capabilities.

      When we talk about conditions, we are talking about the hackers’ geographical situation and their type of relations with us. In addition, if they have physical access to our computer or know about our activities and hobbies, they will have more chance to be successful.

      Even if they have no access to our computers, it is still possible for hackers to access our information and we will discuss the details in the following chapters.

      Different methods for different conditions

      In order to clarify the subject, it is necessary to describe the different conditions of how hackers can get access to victims’ computers and all the methods they use for any of these conditions:

      1- The hacker can have physical access to the victim’s computer. A good example is computers at internet cafes, and others that have more than one user.

      2- The victims’ computer and the hackers’ computer are located in the same network (LAN). Like the computers located in an organizational network.

      3- The victim’s computer is geographically located in another location or even another country, which means, “it is physically impossible to get access to it”.

      Finding out which of the aforementioned conditions is true for the hacker can help us to determine how the hacking will be done.

      In the coming chapters, we talk about each condition separately.

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAQEASABIAAD/4Sz2RXhpZgAATU0AKgAAAAgABgALAAIAAAAmAAAIYgESAAMA AAABAAEAAAExAAIAAAAmAAAIiAEyAAIAAAAUAAAIrodpAAQAAAABAAAIwuocAAcAAAgMAAAAVgAA EUYc6gAAAAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAA

Скачать книгу