Page 2 of 2 FirstFirst 12
Results 11 to 16 of 16

Thread: Can anybody hack without using Trojans?

  1. #11
    Senior Member
    Join Date
    Aug 2003
    Posts
    1,018
    the best thing you can do to sucure your computer is dont piss anyone off
    While that may be, I would argue that a good way to learn to secure your box is to do everything you can to piss someone off, especially if they have better skills than you....

    Besides, life gets a little boring if you don't piss people off from time to time.

    EDIT: My apologies for bringing up a somewhat old thread...it cracked me up for some reason, probably because I am old enough that I don't remember the last time I was worried about pissing someone off...

  2. #12
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323
    the best thing you can do to sucure your computer is dont piss anyone off
    Pissing someone off isn't necessarily the reason why an attacker will go after your computer. Sometimes it's because your system is vulnerable (use it for a launchpad), just because it exists (I call this the Mount Everest theory), for financial gain (hey, data is valuable, even yours!), so they can say they did it (bragging rights), to promote a particular view (hacktivism) and many others. Quite often, IMHO, the "revenge" reason is done by kiddies.
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  3. #13
    Senior Member
    Join Date
    Nov 2001
    Posts
    4,785
    i agree fully with MsM. most of the times you dont even know the perp. they hack you simply because they can.
    Bukhari:V3B48N826 “The Prophet said, ‘Isn’t the witness of a woman equal to half of that of a man?’ The women said, ‘Yes.’ He said, ‘This is because of the deficiency of a woman’s mind.’”

  4. #14
    Senior Member
    Join Date
    Feb 2004
    Posts
    197
    I agree with Sgear17 trojans are what beginners use. but hacking without a trojan deos not let the hacker steel files and do stuff related to that. instead he\or she can do other types of atackes like screw up you computer from the out side (put you off line ect).There are ways to steel files like when using a trojan but they use weak spots in the computer instead of useing a trojan to go in the inside and open the door .


    ps sorry for my spelling

  5. #15
    Senior Member
    Join Date
    Jul 2002
    Posts
    225
    Alaedin, typically speaking, in order to attack a host over a network, one has to exploit a vulnerability in a service(ie. web, mail, DNS, quake, whatever). What a remote access trojan does, basically, is add a running service to a host that is tailored to be exploited. Most modern operating systems that have a TCP/IP stack are also capable of running services, and often do, depending on how they are configured. I believe your question has it's basis in what people used to often say about windows 9x OS's, that out of the box they ran no services, and are incapable of routing IP, so are incapable of being attacked without an installed trojan(outside of file sharing etc.) It's funny but because they were so network-inert(lacking features) it kind of made them more secure.
    \"Now it\'s time to erase the story of our bogus fate. Our history as it\'s portrayed is just a recipe for hate!\"
    -Bad Religion

  6. #16
    Senior Member kr5kernel's Avatar
    Join Date
    Mar 2004
    Posts
    347
    The best way to secure yourself is to promptly install Windows NT 4 Server with Out of the Box IIS.
    j/k
    When I lived on Campus there were random attacks, pissing people off has nothing to do with it.
    Read more posts on here, thats the best thing to do.
    kr5kernel
    (kr5kernel at hotmail dot com)
    Linux: Making Penguins Cool Since 1994.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •