Tracking the Hacker

Corbitt, Terry
April 2003
Management Services;Apr2003, Vol. 47 Issue 4, p20
Academic Journal
The articles focuses on the means of tracking down the person who has hacked into a computer system. Tracking the hacker's methods can help to strengthen the computer system's defenses and may lead to discovery of who was carrying out the hack. The first priority is to fix the problem so that another hacker cannot gain entry to the system. Hackers are people who break into other people's computer systems. Whenever a computer is connected to the Internet a two-way communication link is created between it and every other connected computer system in the world. The threat from hackers to those who spend a lot of time online is greater, the most susceptible group are those who have permanent connection to the Internet such as users of asymmetric digital subscriber line. Hackers scan the Internet for connected computers which have the Window file and printer sharing enabled. If such a computer is found the hacker can then connect to one's shared resources in the computer. Many organizations believe that the value of tracking hackers rapidly decreases when balanced against the bad publicity that comes with admitting the computer system is vulnerable. Originally firewalls were seen as a means of keeping hackers out, however this role is changing as firewalls move from being barriers that control traffic flow to a perimeter manager which integrates traffic management and security.


Related Articles

  • Security. Goodwin, Bill // Computer Weekly;12/6/2005, p1 

    The article reports that a Foreign and Commonwealth Office Web site was recently defaced by a hacker in Great Britain, raising questions about the department's security procedures. The hacker, using the alias Shadow Moon, bypassed the department's firewalls to post a picture of a space alien on...

  • Safety and Security on the Internet.  // World Almanac & Book of Facts;2004, p714 

    Discusses safety and security on the Internet. Basic security rules, such as using caution when giving out personal information; Computer viruses; Importance of installing antivirus software on computers; How protective firewall software guards against hacker attacks; Browsers which allow the...

  • Hands Off My PC! Cohen, Adam // Time;4/30/2001, Vol. 157 Issue 17, p80 

    Discusses computer security for the home. The author's installation of Norton's Personal Firewall, which promised to block outsiders from getting into his computer and to keep a log of anyone that tried; The number of messages that the firewall has blocked; Observations on computer hackers. ...

  • Untitled. Flinders, Karl // Computer Weekly;11/20/2007, p56 

    The article reports that high street bank Halifax PLC is offering its online customers advice on how to secure their online experience through its Security Centre. The service will provide information on security such as advice about firewalls and anti-virus software. Shoomon Perry, head of...

  • IN BRIEF. Johnston, Stuart J. // PCWorld;Sep2005, Vol. 23 Issue 9, p45 

    This article focuses on the security loopholes in several computer programs. When using Adobe Creative Suite 1, Photoshop CS or Premiere Pro 1.5, and the user unintentionally disable the firewall, a possible attack may ensue. The problem lies in the application's license management technology....

  • Firewalls stall Web services. Doyle, Eric // Computer Weekly;3/21/2002, p6 

    Reports the obstruction of Internet services with the activation of corporate firewall programs in Great Britain. Flaw in Web service applications; Advantage to hackers; Apprehension of corporations to hackers.

  • When Fear Is Justified. Fox, Steve // InfoWorld;2/9/2004, Vol. 26 Issue 6, p6 

    Discusses computer security issues concerning Web-based applications, with reference to the article "Are Your Web Apps Secure?," by Curtis Franklin and Jordan Wiens, published in the February 9, 2004 issue of "InfoWorld." Potential problems associated with attacks on such applications;...

  • Securing your system.  // Australian PC User;Jan2008, Vol. 20 Issue 1, p66 

    The article offers a practical guide to keeping one's computer system safe. A firewall is the traffic cop on one's network. It decides what data makes it through and what does not. Modern firewalls can block specific ports and they can block specific applications. Port blocking is rather more...

  • Spyware is a virus. Arquette, Brett // eWeek;11/1/2004, Vol. 21 Issue 44, p39 

    This article presents information on software parasites. Software parasites have become a big problem that the $200,000 worth of firewall, anti-virus, Web content and anti-spam tools can't protect. Spyware is a virus. Spyware loads without the user's permission, it runs invasive processes and it...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics