SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : How high will Microsoft fly?
MSFT 472.920.0%3:59 PM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Dave who wrote (66540)3/31/2002 4:18:53 PM
From: dybdahl   of 74651
 
It is true, even on Windows 2000 and XP.

A basic hacking method is to put a hacker file named the same as a program used by an administrator in a user directory, for instance traceroute.exe. If the system administrator then types traceroute while in a user's directory, the current directory is searched first (default on Windows) and then the hacker tool is executed by the system administrator. The hacker tool can then set appropriate rights for the hacker without having the system administrator know this.

There are many different methods like this that work on Windows but not on Unix and Linux. And the more software you have installed, the worse it gets.

So yes, if you want security against a hacker who wants you badly, don't let your children use the same Windows computer as you do, even if it runs Windows XP.

Some firewalls products can detect some things, if the user knows a lot about network protocols. But most good hacker tools disguise their network connections behind other network connections made by the user, making it almost impossible for endusers to detect this as being a hacker tool.

Dybdahl.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext