Tuesday, September 20, 2011

Internet Cafe Safety - Protect Your Online Identity

This article is primarily intended for passengers to travel around the world, Gap Year, or leave. Passengers are often the most vulnerable, they are in a foreign country with limited resources with only the use of public internet facilities to contact family and friends. It is often recommended by travel websites and companion to a copy of your itinerary, a copy of the password, emergency, travelers check numbers, etc. in your e-mail address so that in case of emergency, and the details are not available.


Internet cafe is often visited by travelers and normal folk alike to update their blogs, pay bills and keep in touch with friends and family. I hope throughout this article, it will educate passengers and other users of public Internet service on some of the possible risks associated with using this service.


so what are the potential risks?


Hackers can easily exploit the public internet facilities where desktop computers are not hardened (ie, not fully patched with latest security updates, anti-virus products, firewalls, unlimited access to the admin etc. ).


in sensitive environments, hackers can install keylogging software / hardware keyloggers to capture the keys typed on the keyboard. If you enter the login credentials to the e-mail, keystrokes entered on the keypad while entering credentials reported. This allows hackers to review the keylogger logs draw your vjerodajnice.Haker then sign up for e-mail and view at your leisure sifting through e-mail for sensitive information that can be used for crime (phishing, etc.). There is a proposal to use the virtual keyboard can be used to defeat keyloggers. While this May be true for hardware keyloggers, a sophisticated software keyloggers can still catch keyboard input virtual keyboard.


Another tool hackers can install the network sniffers / protocol analyzers. This software will capture the data packets to and from workstations (data strings!). So if you use Instant Messaging / E-mail and send and receive messages, sent messages into data packets, if sent, and convert data packets from the message, if received (a simplified view of what is happening). This happens as the messages leave or enter the computer. Network sniffers to capture data while in the form of data packets. All is not encrypted can be read by hackers. Therefore, e-mail / instant messages exchanged confidential information can be recorded and sifted through which a hacker (in order to collect information to support criminal activities ).


is not technically a scam used by hackers is shoulder surfing, where you have a hacker looks at the keyboard while you enter your credentials when logging into the website or the bank to reveal the password.

0 comments:

Post a Comment