february-tw-2016
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
combinations until a correct password is discovered. Be sure to make strong passwords and<br />
change them on a regular basis<br />
Any system connected to a ne<strong>tw</strong>ork can be hacked. T he best solution to prevent hacking is<br />
keep hackers from entering your ne<strong>tw</strong>ork or keep them from isolating you system by<br />
disconnecting it from the ne<strong>tw</strong>ork.<br />
HACKED E-MAIL<br />
T here are many different ways an e-mail account can be compromised. People invent ways to<br />
hack e-mail constantly. Here are 3 methods of how your e-mail account can be hacked.<br />
M ethod #1<br />
Imagine you?re at the food court in the mall. You open your laptop and connect to the mall?s<br />
free WiFi.<br />
Now it?s time to check your e-mail messages because you are expecting important news. You<br />
open the e-mail client on your computer and start browsing the Internet. After a while, you go<br />
on your way to work, home, or school. But did you notice the guy at the next table with his<br />
laptop? He just took your email credentials while you weren?t looking.<br />
He used the Man-in-the-Middle hack. He set up his computer to act like a router and tricked<br />
your computer into thinking that his computer was the actual router. T he mall's router thinks<br />
the guy's computer - in the middle of the connection ? is your computer.<br />
Once a hacker gains access to your ne<strong>tw</strong>ork connection they can view all kinds of data packets<br />
coming from your computer to the mail server (or to any server). Each time you make a<br />
connection to the mail server you are sending your authentication credentials through the bad<br />
guy?s computer.<br />
From there it?s easy to use a program to filter out all packets containing your log-in<br />
credentials. T his includes your Facebook, T witter, and bank account log-in information as<br />
well. Everything!<br />
You can prevent this by not using the free WiFi. Use the Internet connection on your smart<br />
phone. Most smart phones can turn your password protected connection into a hot-spot for<br />
use with your laptop.<br />
25