[ Pobierz całość w formacie PDF ]
."But ssh, like APOP will not protect your email.The solution? Encryption.PGP is popular and can bepurchased at http://pgp.com.I recommend using the RSA option.It is a stronger algorithm than the defaultDiffie-Hellman offered by PGP.************************************************************Newbie note: Encryption is scrambling up a message so that it is very hard for anyone to unscramble itunless they have the right key, in which case it becomes easy to unscramble.************************************************************************************************************************Evil genius tip: While the RSA algorithm is the best one known, an encryption program may implement it inan insecure manner.Worst of all, RSA depends upon the unprovable mathematical hypothesis that there isno polynomial time bounded algorithm for factoring numbers.That s a good reason to keep up on mathnews!The key plot element of the movie Sneakers was a fictional discovery of a fast algorithm to factornumbers.Way to go, Sneakers writer/producer Larry Lasker!************************************************************************************************************************You can go to jail warning: In many countries there are legal restrictions on encryption.In the US, theInternational Traffic in Arms Regulations forbids export of any encryption software good enough to beworth using.If we are serious about freedom of speech, we must find ways to keep our communicationsprivate.So fighting controls on encryption is a key part of winning the battle against repression on theInternet.************************************************************Social EngineeringAs we saw in the GTMHH on how to break into computers, social engineering usually consists of tellinglies that are poorly thought through.But a skilled social engineer can convince you that he or she is doingyou a big favor while getting you to give away the store.A really skilled social engineer can get almost anyinformation out of you without even telling a lie.For example, one hacker posted his home phone number on the bulletin board of a large company, tellingthe employees to call him for technical support.He provided great tech support.In exchange, he got lots ofpasswords.If he had been smart, he would have gotten a real tech support job, but then I can never figureout some of these haxor types.ISP Hostage TakingA favorite ploy of the aggressor in a hacker war is to attack the victim s Internet account.Then theytrumpet around about how this proves the victim is a lamer.But none of us is responsible for managing the security at the ISPs we use.Of course, you may get adomain name, set up a computer with lots of security and hook it directly to an Internet backbone providerwith a 24 hr phone connection.Then, checking account depleted, you could take responsibility for yourown Internet host.But as we learned from the AGIS attacks, even Internet backbones can get taken down.If you point this out, that you are not the guy running security on the ISP you use, bad guy hackers willinsult you by claiming that if you really knew something, you would get a secure ISP.Yeah, right.Here swhy it is always easy to break into your account on an ISP, and almost impossible for your ISP to keephackers out.While it is hard to break into almost any computer system from the outside, there are vastly more exploitsthat will get you superuser (root) control from inside a shell account.So all your attacker needs to do is buyan account, or even use the limited time trial account many ISPs offer, and the bad guy is ready to runrampant.You can increase your security by using an ISP that only offers PPP (point to point) accounts.This is onereason that it is getting difficult to get a shell account.Thanks, cybernazis, for ruining the Internet for therest of us.But even an ISP that just offers PPP accounts is more vulnerable than the typical computer system you willfind in a large corporation, for the simple reason that your ISP needs to make it easy to use.********************************************************Newbie note: A shell account lets you give Unix commands to the computer you are on.A PPP account isused to see pretty pictures while you surf the Web but in itself will not let you give Unix commands to thecomputer you are logged into.******************************************************** Because it is easy to break into almost any ISP, haxor d00d cybernazis think it is kewl to take an ISP hostageby repeatedly breaking in and vandalizing it until the owner surrenders by kicking the victim of the attacksoff.This was the objective in the assaults on Succeed.net in Oct.1997.*******************************************************You can go to jail warning: I usually fubar the names of ISPs in these guides because so many haxor typesattack any computer system I write about.Succeed.net is a real name.If you want to attack it, fine.Justremember that we have boobytrapped the heck out of it.So if you attack, men in suits bearing Miranda cardswill pay you a visit.*******************************************************Why Should I Give a Darn? -- Ways Bystanders Get HurtTo most people, hacker wars are Legion of Doom vs.Masters of Deception stuff.Interesting, but likereading science fiction.But what does it have to do with your life? You may figure that if you never doanything that gets some computer dweeb who thinks he s a haxor mad, you won t have a problem.Yet chances are that you may already have been brushed by hacker war.Have you ever tried to login toyour online provider and couldn t make a connection? Did you call tech support and they told you theywere down for maintenance ? Tried to send email and gotten a message cannot send mail now [ Pobierz całość w formacie PDF ]