What is the process Alhakinj or spyware?
Called in English (Haking) .. and called in Arabic spying operation or penetration ..
Where one of the persons unauthorized to enter the operating system on your computer illegally for the purposes of abnormal such as espionage, theft or vandalism where the person shall be allowed Almottagss (hacker) to convey or wipe or add files or programs as it can be controlled in the operating system who shall issuing commands such as giving the print command, photography or storage ..
Who are the hackers?
They are people who infiltrate your Visttion see what its files, theft or destruction or stalking your device and watch what you do on the Internet ..
What are the things that help them to penetrate your computer?
1 and the existence of a file or Trojan Patch
Hacker can not access to your computer, but with a file called (patch) or (trojan) in your computer and these files are hacker can whereby access to your personal computer is used hacker a spyware that are associated with file Albach, who works as a (receiver) can puts him hacker (user name) and (secret code) enables him to be the only person who can access to your computer and can also make your open Visttia any hacker that enters into your computer!
2 internet access
Hacker can not enter into your computer unless you are connected to the Internet but if your computer is connected to the Internet or any other network, it is impossible to enter into a device except you!
To Zllk if I felt the presence of a hacker in your rushed to disconnect Internet line quickly in order to prevent a hacker from continuing tampering and eavesdropping on your computer ..
3-spyware program
So that ordinary hacker to penetrate your computer must be available with the program helped him to breakout!
Among the most famous programs hackers these programs:
Web Cracker 4
Net Buster
NetBus Haxporg
Net Bus 1.7
Girl Friend
BusScong
BO Client and Server
Hackers Utility
How can a hacker access to your computer?
When exposed computer infected file espionage which (Albach or Trojan), it immediately opens the Port (port) or port inside your Visttia everyone has a spy program to break into your computer through this file, which is open area like a window secrecy that enters them thieves they are hackers!
How can a hacker access to a particular computer?
Hacker can not penetrate a particular computer only if several basic conditions, namely:
1 If this computer file contains spyware (the patch).
(2) If the hacker knows the IP address for this person studying ..
And of course there must be other conditions which the victim's Internet connection and knowledge of how to use the program hacker espionage and penetration through it!
In other words, if your computer sound does not contain any files Patch it is impossible to enter upon any hacker normal even if it knows the IP address study except professionals only they are able to engage in any way and under any mind and they have their ways of confidentiality in access to various systems! !
If the hacker does not know the IP address of your study, it can not access to your computer, even if your file contains the patch!
What is the IP address study?
Is the headline of each user of the Internet that is, the number that you know where your computer while you surf the Internet, which consists of 4 digits and every part of it refers to a specific address Vahdha refers to the title of the country and the following refers to the address of the distributor, and the third to the institution used and the fourth is the user ..
The IP address is a fixed and a variable is changed with each entry to the Internet .. In other words, let's say you contacted the internet and looked at the number your IP address and found that:
212,123,123,200
Then I came out of the Internet or closed contact and then re-connect after several minutes, the figure changed to read as follows:
212,123,123,366
Note the change in the recent numbers: No. 200 became 366.
Therefore advised not to use the offer chat programs such as (Alaaskjo ICQ) because it does show the IP address permanently even with hide Vimcn hacker use it to enter a person with the availability of the requirement is that the computer has this person on a port or file spy (Patch) !
How do your patch file or Trojan or even a virus?
The first way:
To receive a file through espionage someone via chat or (chat) is that a hacker sends you a picture or a file that contains the patch or Trojan!
We must learn dear friend that he can hacker to stick a patch in an image or a file you can not know, but using detection software patch or viruses where you see the image or file is normal and not know that it contains a patch or virus may make your computer a street enters hacker and spammers!
The second method:
To receive the patch through a message via e-mail does not know the source of the message and do not know what the person sent whereupon Download the file attached to the message and then open it and you do not know that it will make everyone walk in to your computer and you Attaflon ..
The third way:
Download programs or files from suspicious sites, such as pornographic websites or sites that help teach spy!
The fourth way:
Access to suspicious sites, such as pornographic websites where it is logged in to the site once it is downloaded the file in your computer by cookies do not know it!
Where the owners of such sites booby-trapped page when a visitor wants to enter these pages are the pages of the site by ordering spy download a file in your computer!
How to choose the device you would like a hacker breached?
Generally normal hacker can not choose a particular computer to penetrate unless he was known IP address studying its own as we mentioned earlier, it does enter the IP address was studying in the victim's computer spying program and then issue an order to enter the desired device!
Most hackers are using a program such as (IP Scan) detector or IP address, a hacker using the program to get the numbers that relate to IP devices battered containing spyware file (Patch)!
The program is run and then the hacker put numbers IBM virtual .. ie it is developing two different numbers from the device are asked to search their example, choose these two figures:
212.224.123.10
212,224,123,100
Note the last two digits and two: 10 and 100
Asks him to search for a computer contains the port (PC factorial) between computers that exist between digital IP studying the following: 212.224.123.10 and 212,224,123,100
A hardware hacker, which asked him to search them!
Then the program by giving the private IP address of any computer factorial falls within the range that is determined, such as:
212.224.123.50
212.224.123.98
212.224.123.33
212.224.123.47
Vijbrh that these are the IP addresses of devices that contain battered outlets or spy files Visttia hacker after taking a number of IP and place it in the spying program and then access devices multiplied!
What are some programs hackers?
netbus1.70
One of the oldest programs in the yard of penetration Balserfrat it is most common among users of a chat program Almaekerosowic its many capabilities that enable a hacker to control your victim and there are different versions of the net more modern dress and all of them clerical more sophisticated than the other ..
SUB 7
Excellent program Needless definition .. can control and coordinate the server to work as you want, whether or change the shape of the modus operandi of a breakthrough in the field of excellent programs ..
Hackers Utility
Useful program and terrible for hackers, especially novices and pros, where he has most of the best possibilities for various programs, hackers and from which to break the secret words for Zip files and decrypt confidential files encrypted as well as the conversion of URLs to numbers IBM and vice versa as do many, many of the capabilities and features that are looking for a lot of hackers ..
Back Orifice
Program goes to the definition of the spread of AIDS among Internet users and devices but can penetrate even a hardware device must be the same virus contaminated the user ..
Deep Throat 2.0
The program scans the file (Sestri) and is replacing it with the server its own and this program where advantage is that you can control sites who visited the victim and you forward it to any place you want and can controlled close and open the screen as well as the use by the program ft. me ..
porter
Scan program works on the IP numbers and the Ports
pinger
Program works (Ping) to see if the victim or the site connected to the Internet or not ...
ultrascan-15.exe
Faster Scan program to work on the victim's machine to see open ports that you can access them ...
Zip Cracker
This tiny program through which you can break passwords compressed files and protected Bbasoord ..
Girl Friend
The program of work a person named (b abortive year) and its main mission is serious and steal all the passwords in your device, including e-mail and Password as well as the user name and secret code that you use to access the Internet ..
How do you know if your device breaking or not?
In the beginning you have to know if your device breaking through knowledge of the changes caused by hackers in the operating system, such as opening and closing the screen automatically or the presence of new files did not enter one or erase files existed or open Internet sites or give an order for the printer in addition to many of the changes that see and know and learn from which the presence of an intruder uses your device ..
This method through which you can know that you entered a malicious user to your mother that your sound of them ..
Open the menu (Start) and ordered them choose (Run).
Type the following: system.ini
You'll see the page, go to the fifth line where if you find that the line is written like this:
user. exe = user. exe
Know that your computer has not been breached by hackers.
But if you find the fifth line is written so
user. exe = user. exe *** *** ***
Know that your computer has been compromised by a hacker.
What is the most important precautions that must be taken to protect against hackers?
1 Use the latest protection from hackers and viruses and make a comprehensive survey periodically and on your computer at frequent intervals as possible, especially if you use the Internet on a daily basis ..
(2) No interference to suspicious sites, such as sites that teach espionage and sites that fights governments or sites that contain films and photographs pornographic because hackers are using the likes of these sites in the introduction of spyware to victims where they are installing file espionage (Patch) automatically in the device once you enter the person to Site!
3 not to open any email from an unknown source because hackers are using e-mail messages to send spyware to victims.
4 not to receive any files during the (chat) from people who are not trusted, especially if these files bearing extension (exe) like (love.exe) or files to be with such Alamtdadan (ahmed.pif.jpg) and the likes of these files a grown spyware programs on your computer Visttia whereby hackers access to your computer and cause harm and problems for you ..
5. not retain any personal information inside your own such as letters, photos, files and other important information such as bank account numbers or credit card ..
6 Place the numbers on a secret mission where your files can not be opened only from the secret number known only as you are.
7 tried as much as possible that you have a certain number of friends online and envisioned them honesty and ethics.
8 Always try to change your password periodically they are permeable.
9 Make sure the lift wire connection to the Internet after the completion of the use of the Internet.
10 Do not receiving any file and upload it to the hard drive in your PC that were not sure of its origin.
What are the most important things you are looking for hackers?
+ Some hackers engaged in espionage as a hobby and a chance to show the potential and the challenge of self and others practiced this work out to achieve several objectives vary from hacker to another and include the following:
+ Get money by stealing banking information such as account numbers or credit card.
+ Get information or photographs for purposes of extortion motivated by financial or Anhraveh some girls as a threat to publish their photographs on the Internet, if not relieved of the financial demands or Anhraveh!
+ Access to files as beautiful as Alerkamax files or PowerPoint or sounds or images, or ...
+ Demonstrate the ability to infiltrate and confront obstacles and opportunity for Iftikhar achieving victory in the event of a hacker to access a hardware or IT systems ..
+ Get the secret codes for e-mail to allow him to spy on private messages or to steal the name of the entire e-mail!
+ Get the secret code for one of the sites in order to destroy it or change its contents ..
+ Revenge of a people and the destruction of his machine in order to oppress or humiliate him ..
What are the months method for the detection of spyware?
There are many ways to detect the presence of spyware on your computer ..
The first way: detection software, spyware and viruses
Use a detection software spyware as well as protection from spyware and hackers through the work firewall prevents hackers entering ...
Of the most famous and best programs to detect spyware:
Norton internet security
Zone alarm
MacAfee firewall
The Cleaner
Among the most famous and best protection software from hackers:
ZoneAlarm
LockDown 2000
Jammer
Internet Alert 99
Tiny Personal Firewall
The second way: by recording file system Registry:
- Click on the Start button Start.
- Type in the Run command box Operating: rigedit
- Open the following folders in the order in the list of Registery Editor:
- HKEY_LOCAL_MACHINE
- Software
- Microsoft
- Windows
- Current Version
- Run
- And now from the window of the system registry Registry Editor see to the right of the window you will see a split-screen under the list of file names Names that work with startup list and the corresponding addresses in the list of Data Files.
- Note well the files and found a file to Aakablh Paypal address or Data has appeared in front of him a small arrow <--- he is a spy as a file does not have a specific address Baloyndoz.
- Get rid of it by pressing the right mouse button and then Delete
The third way: command: msconfig
- Click on the Start button to begin
- Type in the box Operating Run the following command: msconfig
- Will show you the System Configuration Utility window
- Choose from this window from the top section Start up
- You'll see the screen displays the programs that start to work directly with the startup device.
- Check out these programs well, given the peculiar questioned the existence of programs you did not install device uncheck the box phenomenon small signal corresponding in doing so, has stopped work program espionage or other unwanted programs.
The fourth way: by player stomping Dos:
This method was used before the advent of Windows to show the spyware and trojans, such as the patch, one of the easiest ways:
- Open the stomping of Inductor MSDos Start menu to start
- Type the following command:
C: / Windows \ dir patch. * E
- If any file Albach do swab in the following way:
C: \ Windows \ delete patch. *
Positions with hackers
A hacker entered on the device profile for one of the girls and took watching the contents of images and files, and drew his attention that the camera is connected to the device he issued an order imaging took watched a used computer, and then sent her a message telling her where they are very very beautiful, but (Ya Reit if reduce the amount of make-up)! !
A professional hackers used to enter the online banking sites and sneaking smoothly to balances and accounts takes one dollar from every rich and puts the total dollars in an account balance of less people!
One of the young people entering the devices and delete the child pornography files and sexuality and this is the same (just a philanthropist), which forgets that this (thief and a robber intruder)!
He used hackers to try to break through the big sites such as site Yahoo and Microsoft site, but they always fail in their goals this because of firewalls developed by these companies and procedures huge followed to prevent any hacker from entering the system and with this successful hacker to penetrate the system, but in less than five minutes can employees of the company to get things back on course!
The penetration and espionage crime punished by law in many countries of the world, and so do not be surprised, my dear brother to see the hacker next to the killer and Pusher and thieves, but the difference is that once you exit the hacker from prison finds a rapturous welcome from major international companies which accelerated to hire hackers in order to benefit from their experience in the fight against hackers, as well as to take advantage of their knowledge in building programs and systems are unable to hackers for storm ..
Believe in the wisdom of all hackers: No operating system without outlets and there is no device that does not contain a gap and there is not a hacker can break into!
Most of the stronger hacker in the world are programmers can computer engineers communication and networking, but the strongest of them are young people and teenagers armed with a challenging and adventurous spirit who unload their time to learn more and more in the science of spying and snooping on people, and generally the fate of all those mostly to prison or the largest computer companies and programming in the world! !
Now turned wars from the battlefields to the squares of the Internet and computer and become hackers of the strongest and mightiest soldiers employed by governments and private (intelligence) where they can sneak Anonymous to the organs and systems of the enemy and the theft of priceless information, as well as the destruction of sites and so on .. and also do not forget wars electronic spin fought between the Arabs and the Jews and the Americans and the Russians
