Shields Up
Are you really in any danger?
Kevin Curran, Lecturer in Computer Science
The Internet is full of great information and many useful resources. But it also contains things that crawl around in the dark and go bump in the night. I think you'll be as surprised as I was to learn how much of that is really happening today.
Yes, there can be no question that you're in danger:
If your computers are only connected to the Internet briefly, when you're browsing the web or retrieving and sending eMail, your connection exposure will be minimal. But if you are one of the millions of people who are discovering the amazing power and convenience of a persistent connection to the Net through a cable modem or DSL line and if you leave any of your computers on and connected for hours at a time, then your exposure is substantially greater.
That's a very good and reasonable question, but the answer might frighten you as it frightened me. Here's the crux of it:
|
There are MANY FREELY AVAILABLE "scanners" being run by bad people who are sweeping the Internet looking SPECIFICALLY for computers running Windows File and Printer Sharing! And if those shares are password protected and sufficiently interesting, any freely available password cracker will silently pound on your password until your defenses have been penetrated! |
![]()
![]()
Scanners?![]()
Oh yes. Many Internet scanners specifically seek out and locate Windows file and printer shares (see samples below), whether they are protected by passwords or not! Malicious computer vandals leave these scanners running night and day collecting IP addresses one of them might be yours! then they "map" that drive's shares onto their local drive letters to gain total access to your computer's files!
The power of these tools is a matter of great pride for the true hackers on the Net. By "true hackers" I mean someone who is more interested in what they can do, than in what they can do to you. This is why I'm careful here to call people who break into your computer "intruders", "crackers" or "vandals" rather than "hackers." Hackers don't necessarily "do bad" with their tools and knowledge. They pursue "hacking knowledge" for its own sake.
To give you a feeling for what goes on out there in the nether regions of the Internet, here is a boast made by the author of the powerful "Asmodeus" scanner:
|
As you can see, it's more about the technology than about the damage that can be done. Greg, for example, is much more interested in how many countries he can scan than in their individual computers. (If you haven't clicked on either of those links right above you might get a kick out of reading something else Greg wrote.)
Unfortunately, the technology generated by the really top-notch hackers is made freely available to anyone on the Net. This technology is picked up by much less accomplished vandals or "crackers" (often referred to by the disparaging term "Script Kiddies") who take those powerful tools and apply them to much less intellectual nefarious ends.
![]() Click image for full description. | ![]() Click image for full description. |