Maintaining Anonymity - First Step To Hacking



Smart hackers want to be as low-key as possible. Covering their tracks is a
priority. In fact, success often depends on it. They don’t want to raise suspicion so they can come back and access the systems in the future. Hackers often remain anonymous by using one of the following techniques:

- Borrowed or stolen dial-up accounts from friends or previous employers
- Public computers at libraries, schools, or kiosks at the local mall
- Internet proxy servers or anonymizer services
- Anonymous or disposable e-mail accounts from free e-mail services
- Open e-mail relays
- Unsecured computers — also called zombies — at other organizations
- Workstations or servers on the slave’s own network


If hackers use enough steppingstones for their attacks, they are hard to trace.


Responses

0 Respones to "Maintaining Anonymity - First Step To Hacking"

Post a Comment

 

Popular Posts

Recent Comments

free counters
Return to top of page Copyright © 2010 | Platinum Theme Converted into Blogger Template by rUsTlEs xEr0