Until a few years ago, the
people used to lodge reports of theft of money,
essentials, and necessary documents at the police station. Thieves
sometimes broke into houses, shops, and factories, and loot. After
filing the first information report of theft, the police would take steps to
arrest the thieves and robbers. After committing petty theft, street,
neighborhood, city, and areas would be ruined, middle-class thieves would leave
the area and find refuge in other districts or provinces, mafia or big thieves
would often be deported and take temporary refuge in Arabia and Africa.
As soon as conditions were favorable, they would
return to their respective areas and starts planning for the
next incident. As the world progressed, so did technology. On the one hand, the
advent of technology has accelerated business, social, political, and social
relations, and on the other hand, thieves have started using technology to
commit crimes. Theft through the internet is called cyber crime. In
cyber crime, the hunter is also a computer and the victim is also a computer.
Suppose one day you sleep on your computer after completing all your data and
work. But the next day your computer does, 't show any of your files. So what
do you think of it? Whatever you think, but the world calls it cyber crime.
Hackers : It
is not just computer crime but computer brainwashing.Crimes are actually the
most dangerous crimes in the swamp of sin. Hackers not only succeed in gaining
access to the computer, but they also destroy the privacy of the victim's
computer.
And the owner of the victim computer becomes a hacker. Hackers or
fraudsters are active all the time. They monitor all your activities on the
Internet and rob you at every opportunity. Hacking began in 1981 when
BLACK BARL created a WARLORDS farm in the
United States. The Tennessee Tuxedo group became very popular. One of
the young men used the trunk line for a long conference call, the other notable
ones were Appeal Bandit, Crackwoz, and Crack man
.
In 1983, the FBI hacked 06 minors. The suspect
was identified as 414, S. He broke about 60 computer codes, including the
Memorial Saloon Catering Cancer, and the Los Alamos National Laboratory
computer. Eric Carly used hacking in 1984, and a 17-year-old in 1987.
Herbert
Types of
hackers
A hacker is a person or group who attacks computer systems knowing
their weaknesses. Used for personal gain, but also for making money. Every
year millions of hacking-related cases come to light all over the world. ☺
There
are the following types of hackers: 1) White Hackers; These are hackers who are
used for good purposes, they find the flaws in the program and the system and
tell the solution. And protect the public from destruction. 2) Black Hackers:
These hackers are the security of the computer. They break and use it for
personal purposes. They steal the information contained in computers and emails. 3) Gray Hackers This is a joint group of black hackers and white hackers.
Used
for good and bad purposes. Hacking actually shows the vulnerabilities of the
victim's computer, and the hacker attacks keeping in mind the vulnerabilities
of the computer.
Crackers :Hackers use this work not only for their own
benefit but also to make money. A second term associated with the
hacker is called a cracker. ۔ This means hacking into a computer.
Crackers actually help hackers find a way to get into any computer system. Whether
hacking is for good or bad, both are wrong, breaking someone's privacy and
changing or destroying it by accessing it cannot be good intentions at least. However, keep your computer away from hacking as much as possible and keep it
updated on a daily basis.❤☺
2) Asking for money from friends.
Hackers hack anyone's e-mail address and send e-mails to all of that person's
friends, which reads“I'm at a certain place right now, my wallet
containing credit cards. And there was cash, someone stole it, now I don, 't
have money to pay the hotel bill, please send me some money immediately so that
I can pay the hotel bill, I will pay the refund''. Some friends
transfer money without confirmation. And most of the friends try to contact but
the hacker has hacked even the mobile phone. The hacker accumulates innumerable
wealth in minutes. What do the hackers do after hacking the website?
Recently,
the news was published that Pakistani IT experts in collaboration
with a leading, Japanese, data security company have succeeded in
developing the world's best web firewall software to prevent all kinds of cyber
attacks on websites. The software has been dubbed, "SWIFE”, a system-based web application
firewall. , Cross Site, MySQL
Injection, DOS Attack, Site Defamation Attack can be easily protected from such
attacks. Is reported as “Anti-Virus XP 2010” or “Security
Tool” and you are warned that a dangerous bug has entered your computer. You are encouraged to click on a link to start scanning your computer. You
click and the virus is detected. Now the company is asking you to remove the
virus from your computer for a fee of 50. What happens is that when you
click on a link, the counterfeit company installs a piece of malware into your
computer. It does not have to eradicate the virus, but it does steal your
credit card number and steal all the money from your account while your
computer is also out of date. Investors try to extract the most valuable notes in the shortest
possible time without risking too much. Researchers say such attackers try to
extract the most valuable notes.
So, they have a secret code in their specific program and
after that, the money can be withdrawn from the ATM. And every time
to know the code, another member of the gang has to call, even if it is for
three minutes. If nothing is done on this machine, the machine returns to
normal. Researchers say that they did not know the name of this software. But
efforts are being made to curb it. https://theconversation.com/au/topics/cybercrime-3809 The UK Secretary of Defense recently
announced plans to set up a cyber unit to protect national security. For the new joint cyber reserve unit, the Ministry of Defense will recruit
hundreds of computer experts as reserves with permanent members.
When we talk, we
think of land, sea, and air. A long time ago, there was a
fourth type of space, and now there is a fifth type of cyber. How to protect yourself : 1) If you
are traveling, do not use your credit or debit card details to purchase a Wi-Fi
network or create an advance account with airport providers. 2) Always ON the
mobile verification alert. Put it. So that if someone is online from
another computer, you will receive a message. 3) Do not use your passwords on
any friend, relative, café system. 4) Never tell your password to
anyone. 5) Always Create strong
passwords, which should be at least 09 words.❤☺👬☝☺👯
0 Comments