![Hackers Hackers](http://mcraig.org/mark/images/grip-20050731.png)
Kuang2 hackers program kuang2 download hackers أو نضيف امتداد مثل kuang2.zip kuang2.exe وانشاء الله راح تحصلون البرنامج لأن هذا يتطلب على قدرة الشخص في البحث لاأكثر وهي أفكار بسيطة لاتعتمد في ان يكون الشخص خبير أو محترف. Apr 10, 2018 - Download hackers software. A free Development program for Windows. Total System Care is a program devised by Safebytes to ensure that a.
Well, first of all, they need to get hold of the victim's IP Address. Your IP (Internet Protocol) address reveals your point of entry to the Internet and can be used in many ways to cause your online activities many, many problems. It may not reveal you by name, but it may be uniquely identifiable and it represents your digital ID while you are online (especially so if you're on a fixed IP / DSL etc). With an IP address, a Hacker can find out all sorts of weird and wonderful things about their victim (as well as causing all kinds of other trouble, the biggest two being Portnukes/Trojans and the dreaded DoS ((Denial of Service)) attack). Some Hackers like to collect IP Addresses like badges, and like to go back to old targets, messing them around every so often.
An IP address is incredibly easy to obtain - until recently, many realtime chat applications (such as MSN) were goldmines of information. Your IP Address is contained as part of the Header Code on all emails that you send and webpages that you visit can store all kinds of information about you. A common trick is for the Hacker to go into a Chatroom, paste his supposed website address all over the place, and when t he unsuspecting victim visits, everything about your computer from the operating system to the screen resolution can be logged.and, of course, the all im portant IP address.
In addition, a simple network-wide port scan will reveal vulnerable target m achines, and a war-dialler will scan thousands of lines for exposed modems that the hacker can exploit. So now that you know some of the basic dangers, you're probably wondering how these people connect to a victim's machine? Now, 'Proto(col)' simply means what kind of data transmission is taking place (TCP or UDP), 'Local address' is your com puter (and the number next to it tells you what port you're connected on), 'Foreign Address' is the machine that is connected to you (and what port they're using), and finally 'State' is simply whether or not a connection is actually established, or whether the machine in question is waiting for a transmission, or timing out etc.
Now, you need to know all of Netstat's various commands, so type. Displays protocol statistics and current TCP/IP network connections. NETSTAT -a -e -n -s -p proto -r interval -a Displays all connections and listening ports.e Displays Ethernet statistics. This may be combined with the -s option.n Displays addresses and port numbers in numerical form.p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
If used with the -s option to display per-protocol statistics, proto may be TCP, UDP, or IP.r Displays the routing table.s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p option may be used to specify a subset of the default. These run on 1024 to 49151. Although not bound to a particular service, these are normally used by networking utilities like FTP software, Email client and so on, and they do this by opening on a random port within this range before communicating with the remote server, so don't panic (just be wary, perhaps) if you see any of these open, because they usually close automatically when the system that's running on them terminates (for example, type in a common website name in your browser with netstat open, and watch as it opens up a port at random to act as a buffer for the remote servers). Services like MSN Messenger and ICQ usuall y run on these Ports. Now, it is essential that you know what you're look ing for, and the most common way someone will attack your machine is with a Trojan.
This is a program that is sent to you in an email, or attempts to bind itself to one of your ports, and when activated, it can give the user your passwords, access to your hard drive.they can even m ake your CD Tray pop open and shut. At the end of this Document, you will find a list of the most commonly used Trojans and the ports they operate on. For now, let's take another look at that first example of Netstat.
Trojan horses A Trojan horse is a computer program which carries out malicious operations without the user's knowledge. The name 'Trojan horse' comes from a legend told in the Iliad (by the writer Homer) about the siege of the city of Troy by the Greeks. Legend has it that the Greeks, unable to penetrate the city's defences, got the idea to give up the siege and instead give the city a giant wooden horse as a gift offering. The Trojans (the people of the city of Troy) accepted this seemingly harmless gift and brought it within the city walls. However, the horse was filled with soldiers, who came out at nightfall, while the town slept, to open the city gates so that the rest of the army could enter. Thus, a Trojan horse (in the world of computing) is a hidden program which secretly runs commands, and usually opens up access to the running it by opening a backdoor. For this reason, it is sometimes called a Trojan by analogy to the citizens of Troy.
Like a, a Trojan horse is a piece of harmful code placed within a healthy program (like a false file-listing command, which destroys files instead of displaying the list). A Trojan horse may, for example:. steal passwords;.
copy sensitive date;. carry out any other harmful operations;. etc.
Worse, such a program can create an intentional security breach within your network, so as give outside users access to protected areas on the network. The most common Trojan horses open, allowing their designer to gain entry to your computer over the network by opening a backdoor or backorifice. A Trojan horse is not necessarily a virus, as its goal is not to reproduce itself to infect other machines. On the other hand, some viruses may also be Trojan horses; that is, they might spread like viruses and open ports on infected machines! Detecting such a program is difficult because you must be able to determine whether an action is being carried out by the Trojan horse or by the user.
Symptoms of infection Infection by a Trojan horse usually comes after opening a contaminated file containing the Trojan horse (see the article on ) and is indicated by the following symptoms:. Abnormal activity by the, network adapter or: data is being loaded without any activity from the user;.
Strange reactions from the;. Programs opening unexpectedly;. Repeated crashes.
Principle of a Trojan horse As a Trojan horse is usually (and increasingly) intended to open a on your machine so that a can gain control of it (such as by stealing personal data stored on the hard drive), the hacker's goal is to first infect your machine by making you open an infected file containing the Trojan and then to access your machine through the opened port. However, to be able to infiltrate your machine, the hacker normally has to know its. So:. Either you have a fixed (as with businesses, or with individuals with a or similar connection, etc.) in which case your IP address can easily be discovered;. or your IP address is dynamic (reassigned each time you connect), as with modem connections; in which case the hacker must scan IP addresses at random in order to detect those which correspond to infected machines.
Protect yourself from Trojans Installing a (a program which filters data entering and leaving your machine) is enough to protect you from this kind of intrusion. A firewall monitors both data leaving your machine (normally initiated by the programs you are using) and data entering it. However, the firewall may detect unknown outside connections even if a hacker is not specifically targeting you. They may be tests carried out by your Internet service provider, or a hacker randomly scanning a range of IP addresses. For Windows systems, there are two free high-performance firewalls:. In case of infection If a program whose origins you are unsure of attempts to open a connection, the firewall will ask you to confirm it before initiating the connection. It is important to not authorize connections for a program you don't recognise, because it might very well be a Trojan horse.
If this reoccurs, it may be helpful to check that your computer isn't affected by a Trojan, by using a program that detects and deletes them (called an anti-Trojan). One example is The Cleaner, which can be downloaded from. List of ports commonly used by Trojans Trojan horses commonly open a port on the infected machine and wait for a connection to open on that port, so that hackers will be able to gain total control over the computer.