Firewall Hacking

You probably heard this question a few times, coming from people that are convinced they are not going to be targeted by any hacker out there. What these people don’t understand is that it doesn’t take a hacker to destroy your computer and you don’t have to be targeted personally.

There are numerous ways you can get hacked and there won’t be a physical person at the other end, but a software program or procedure, randomly targeting you, like it can target anyone else on the Internet. A firewall is the best security option around these days, providing you with safe browsing over the Internet. Here’s just a small list of what firewalls protect your PC or local network from:

Firewall DOS

Denial of Service – probably the most commonly used hacking procedure targeting large companies over the net, also being nearly impossible to counter. Almost all big www companies have experienced these kinds of DoS attacks. What the hacker does, is send a request to the server to connect to it. The server responds with an acknowledgment and tries to establish a session, but it cannot find the system that made the request. By inundating a server with these unanswerable session requests, a hacker causes the server to slow to a crawl or eventually crash.

Remote Login – Most operating systems have a remote login procedure. Finding a backdoor to this protocol, a hacker or virus is able to take full control of your computer, infecting it, deleting files and basically running your computer from a remote distance.

SMTP session hijacking – SMTP is the most common method of sending e-mail over the Internet. By gaining access to a list of e-mail addresses, a person can send unsolicited junk e-mail (spam) to thousands of users. This is done quite often by redirecting the e-mail through the SMTP server of an unsuspecting host, making the actual sender of the spam difficult to trace.

Viruses – A virus is a small program that can copy itself to other computers. This way it can spread quickly from one system to the next. Viruses range from harmless messages to erasing all of your data or even changing the power output of you mother-board which will eventually burn it.

Macros – Macros are programs that repeat the same procedure over and over again, following a script that is set first. Hackers have taken advantage of this to create their own macros that, depending on the application, can destroy your data or crash your PC.

Firewall Hacking Methods

However these are just a few of the most commonly used methods of breaking into your PC. Most of them can be stopped by a perfectly-configured firewall and a good anti-virus program (although some firewalls have built-in anti-viruses, it’s best if you install an additional reliable one too).

What some people don’t seem to grasp, is that you didn’t have to offend or bother someone to get hacked. Viruses and other malicious software programs choose their targets randomly. The combination of good firewalls and anti-virus programs is the only way to feel safe.