Internet Security

Protect yourself... from hackers

What is a hacker?

A hacker or more accurately a "cracker" or "black hat hacker" is a person who commits a crime using software or specialized computing techniques in order to circumvent or destroy a computer program, system or network for malicious purposes without the owner's knowledge.

When a hacker infiltrates your computer, he is able to extract confidential information, such as your credit card numbers, or even use your computer as a springboard to commit other illegal activities.

Hackers (or crackers) exploit security vulnerabilities to break into or "crack" a computer system and violate the system integrity in order to steal, alter or destroy information, or fraudulently copy software.

An ethical hacker or "white hat hacker" is an experienced programmer who uses his knowledge to solve problems or develop software or other electronic components. His aim is to build something and not to destroy it.

Computer crime, Internet crime, e-crime, cyber crime... all refer to an activity in which a computer or the Internet is used to further a criminal purpose.

A pirate is someone who illegally reproduces software (or music or videos), meaning that he/she steals or hijacks content, ignoring copyright laws. This also includes file sharing.

There are three types of hacking:
Software piracy:

Software piracy is the illegal copying of software and circumventing of installation procedures in order not to avoid paying license fees (applications, music, games, etc.). Consult the Canadian Alliance against Software Theft at www.caast.org (Opens in New Window) for more details and some tips. Certain pirated software may also contain subroutines (sometimes called "Trojan Horses") that take advantage of a security weakness in the user's computer enabling its creators to access confidential information or even remotely control a server to commit mischief.

Computer hacking:

Computer hacking is the committing of mischief to a user's data (destroying, altering, rendering meaningless, useless or ineffective) or the fraudulent or unauthorized use of his computer in order to use it remotely as a tool to commit an offense. When a user's computer or server is hijacked, it becomes a zombie PC and is used without his knowledge to commit various mischief, such as:

Network hacking:

Network hacking is accessing data by intruding into a computer network to which computers are connected in order to manipulate or steal confidential information. The intention behind these attacks may be to gain access to a system, steal industrial secrets, gather information on a competitor's activities, disrupt a service or simply use the bandwidth. A hacker who succeeds in infiltrating a computer network through a security vulnerability can use this breach to install a "rootkit", a small program that is surreptitiously installed in the heart of the operating system. In addition to facilitating access to confidential information, the rootkit has the special feature of being invisible to the operating system and is therefore very difficult to get rid of. It allows the hacker to return later to the same network without having to get around the security weaknesses again and without being blocked by the many security barriers.

How to protect yourself

To make life hard for hackers, you should install a firewall and anti-virus software on your computer, such as those included with NorthernTel's Internet Security Services. Among other things, they allow your computer to recognize and block any attempts to intrude into your computer or to connect an application with an external website.

The firewall included with NorthernTel's Internet Security Services:

The antivirus software included with NorthernTel's Internet Security Services:

Hacking security tips