Internet Security
Protect yourself... from hackers
What is a hacker?
A hacker or more accurately a "cracker" or "black hat hacker" is a person who commits a crime using software or specialized computing techniques in order to circumvent or destroy a computer program, system or network for malicious purposes without the owner's knowledge.
When a hacker infiltrates your computer, he is able to extract confidential information, such as your credit card numbers, or even use your computer as a springboard to commit other illegal activities.
Hackers (or crackers) exploit security vulnerabilities to break into or "crack" a computer system and violate the system integrity in order to steal, alter or destroy information, or fraudulently copy software.
An ethical hacker or "white hat hacker" is an experienced programmer who uses his knowledge to solve problems or develop software or other electronic components. His aim is to build something and not to destroy it.
Computer crime, Internet crime, e-crime, cyber crime... all refer to an activity in which a computer or the Internet is used to further a criminal purpose.
A pirate is someone who illegally reproduces software (or music or videos), meaning that he/she steals or hijacks content, ignoring copyright laws. This also includes file sharing.
There are three types of hacking:
Software piracy:
Software piracy is the illegal copying of software and circumventing of installation procedures in order not to avoid paying license fees (applications, music, games, etc.). Consult the Canadian Alliance against Software Theft at www.caast.org (Opens in New Window) for more details and some tips. Certain pirated software may also contain subroutines (sometimes called "Trojan Horses") that take advantage of a security weakness in the user's computer enabling its creators to access confidential information or even remotely control a server to commit mischief.
Computer hacking:
Computer hacking is the committing of mischief to a user's data (destroying, altering, rendering meaningless, useless or ineffective) or the fraudulent or unauthorized use of his computer in order to use it remotely as a tool to commit an offense.
When a user's computer or server is hijacked, it becomes a zombie PC and is used without his knowledge to commit various mischief, such as:- Phishing (massive emailing soliciting bank and personal data);
- Spamming (sending of unsolicited email);
- Theft of data (credit card numbers, passwords);
- Identity theft (given name, surname, address, social insurance number);
- Drug trafficking, national security threats, smuggling of illegal immigrants, distribution of child pornography. Consult in this regard the Integrated Technological Crime Unit (Opens in New Window) section of the Royal Canadian Mounted Police web site for more details.
Network hacking:
Network hacking is accessing data by intruding into a computer network to which computers are connected in order to manipulate or steal confidential information. The intention behind these attacks may be to gain access to a system, steal industrial secrets, gather information on a competitor's activities, disrupt a service or simply use the bandwidth.
A hacker who succeeds in infiltrating a computer network through a security vulnerability can use this breach to install a "rootkit", a small program that is surreptitiously installed in the heart of the operating system. In addition to facilitating access to confidential information, the rootkit has the special feature of being invisible to the operating system and is therefore very difficult to get rid of. It allows the hacker to return later to the same network without having to get around the security weaknesses again and without being blocked by the many security barriers.How to protect yourself
To make life hard for hackers, you should install a firewall and anti-virus software on your computer, such as those included with NorthernTel's Internet Security Services. Among other things, they allow your computer to recognize and block any attempts to intrude into your computer or to connect an application with an external website.
The firewall included with NorthernTel's Internet Security Services:
- monitors your computer and ensures that your information remains private by automatically blocking any intrusion attempts;
- filters incoming and outgoing traffic according to your chosen settings and keeps a log of activities;
- is updated regularly for new spyware in circulation;
- includes a remote access control tool that blocks automatic diallers (these automatic diallers (malware) disconnect your computer from your Internet Service Provider and reconnect to an international number, often without your knowledge, resulting in substantial long-distance charges on your phone bill).
The antivirus software included with NorthernTel's Internet Security Services:
- detects whether your computer is already contaminated with viruses and disinfects it;
- protects your computer from new incoming viruses in e-mail attachments or file downloads;
- automatically downloads and updates new virus definitions;
- lets you manually activate a scan on your computer to disinfect it
Hacking security tips
- Beware of "special or very low-priced software offers" touted in spam or on questionable commercial web sites. Only purchase your software from authorized vendors.
- Install a firewall and configure it to allow or block access to certain websites or to prevent the sending or receiving of predefined confidential information.
- Install antivirus software. Follow the virus protection tips.
- Although your firewall and antivirus software protect you against hacking, you should still remain vigilant and adopt safe practices at all times when downloading over the Internet, opening e-mail attachments, visiting questionable websites, and entering confidential data in forms or software, etc.
- Regularly update your operating system so that it contains the latest security patches. Hackers exploit security vulnerabilities in operating systems that have not been updated.
- Don't write down your passwords anywhere or share them with anybody. Change them regularly and make sure that they are difficult to crack. A password should not contain personal information but instead letters (upper and lower case) and numbers. Here is an example of a password: "Nb9Tek45".
- Get NorthernTel's Internet Security Services which includes a very efficient firewall and anitvirus software.