Вы находитесь на странице: 1из 6

5-Page Draft (which, with additional work, will become your completed recommendation report)

Memo
To: From: CC: Date: Re:

Internet community

July 6, 2012 Proposal to Write a Recommendation Report about HACKING

Introduction.......................................................................................................................1 Background ......................................................................................................................1 Criteria..............................................................................................................................2 Possible Solutions.............................................................................................................3 Conclusions and Recommendations...................................................................................4 Reference:........................................................................................................................6

Introduction
The purpose of this recommendation report is to the advantage and the consequences of Hacking. The audience for this report is everyone who has a computer or uses one. This report will focus on hackers and the techniques they used; And how to successfully protect your computer , info .

Background
The number of computer being hacked in the past decade is increasing at an exponential rate due to the expansion of the World Wide Web and the lower cost of internet. Consequently, anyone can afford a computer or is able a have internet at home, which wasnt the case in the 80s. Although, it made the world literate, the number of hacker in the planet have grown up too. Back in December 2008 , while I was still in high school , someone scam me and due to that was able to get all my info ; since that day I became more involved in hacking , fell in love in computer , spend the rest of year taking computer classes . Two years after , I wanted to get my revenge so I started to test what I learned in the class room I started making password stealer , copy music from my friend pc without him knowing .. Then it even got bigger I joined a hacking association and started breaking into Russian website . Like expected, the guy we were hacking attack us back and I lost all of my data; thats when I started changing; thanks god my conscience hit me I realized what I was doing was wrong so I started to inform people about the danger of surfing the net and taught them some

easy tricks, started making anti-virus but stop because it time consuming. Learning how to hack, helped me recognize malicious users, meaning a rogue employee, Contractor, intern, or other user who abuses his or her privileges , and their technique .The Best thing have learn so far about hacking is that we hacker are making the word a better Place; so being from that background is kind of like an honor for me. The problem today with hacking is not only the so called hacker but ourselves too ; as humans being we are pushed by that desire to know something that we shouldnt like spying on our friend , hack his Facebook account ,spying on our ex girl friend . Reason why in 2012 , an hacker can be anyone , your father , mother or brother , and thanks to site like http://hackyourlove.com and many other like it ; It make it even more easier to break into someone else system thats why its important to at least know the basic of ones computer , how it function etc

Criteria
Through research and conversation with the seniors member in my online community, we agreed that the using an antivirus is the only way someone could protect himself against hacker; And we all set the following solution for the solution of the problem: Auto-protection Cost Strong password Auto-protection: There is nothing more important than a software that always asks for your decision before doing or performing and action. Many companies have fallen down because they were not able to adapt to the new trend, Panda antivirus for instance .In order to prevent malware from installing on your computer. Youre going to have a have something or software that can protect itself.

Cost:

It has to be expensive, meaning; the cheaper option is not always the best one. The advantages to using paid software programs usually include full technical support, easy installation, and very little configuration required. Performance wise, many well-known, software programs are on par with programs. Despite the fact that paid anti-virus programs are feature rich and offer a more comprehensive security suite.

Strong Password: This is the most important criteria especially for Facebook , MySpace or twitter users . You password has to be at least 12 characters long if you want to consider yourself safe from brute force password hacks. From MSNBC: "'Eight-character passwords are inadequate now ... If eight characters is all you use, and if you restrict your characters to only alphabetic letters, it can be cracked in minutes,' said Richard Boyd, a senior researcher at GTRI." We've highlighted how easily common passwords can be hacked, but even if you've got a system auto-generating your passwords, you may want to make sure you're going for at least 12. It may seem like a lot to remember but that's where a great password management solution comes in handy.

Possible Solutions
Through research and conversation with the seniors member in my online community and we all set the following solution for the solution of the problem: Install Protective Software Include special characters or numbers in your Password Never Leave Your Computer Unattended Install Protective Software While firewalls and antivirus software sound important, they are not 100% effective. Antivirus software in particular is a reactionary defense, meaning it can protect against known infections, but there will always be new and improved versions of a virus that can bypass even the most up-

to-date defenses. There are 2 main types of protective software when it comes to Internet safety network firewalls and antivirus software. A firewall is something that protects your private network from being accessed by an outsider. Antivirus software protects your personal computer from malicious infections. And this definitely will help you be safe Include special characters or numbers in your Password Here is some tips about choosing the right password: Do not choose a password based upon personal data like your name, your username, or other information that one could easily discover about you from such sources as searching the internet. Do not choose a password that is a word (English or otherwise), proper name, name of a TV show, keyboard sequence, or anything else that one would expect a clever person to put in a "dictionary" of passwords. Do not choose a password that is a simple transformation of a word, such as putting a punctuation mark at the beginning or end of a word, converting the letter "l" to the digit "1", writing a word backwards, etc. For example, "password, 123" is not a good password, since adding ", 123" is a common, simple transformation of a word.

Never Leave Your Computer Unattended Be careful and cautious; never leave your computer unattended. You should always shut your computer down or lock it after your done using it .This is just common sense

Conclusions and Recommendations


The following chart summarizes my findings.

Based on my findings, I recommend using Bit defender to protect your computer against hackers; Although it take a lot of power of ram it will protect your identity , warned you when youre trying to access a dangerous website yet it cheaper than the other one and better .Although u cant really protect yourself against hackers , having an antivirus , updating your computer or never leave your computer unattended will definitely reduce your chances of being hacked .

Reference:
Beaver, Kevin. Hacking for Dummies 3rd Edition. For Dummies; 2010. Print. Erickson, Jon. The American Way of Birth. No Starch Press; 2nd edition 2008. Print. Archer, Danny. AV Comparatives The Best Antivirus Software Comparison Chart .Title of Online Publication Version (2009): Pages 1. Date Accessed < http://www.av-comparatives.org/ >. Hackyourlove team. Facebook hack Hackyourlove Version (Year Published): Pages. 2011 .Accessed <hackyourlove.com>. Tiffert, Glenn. 10 ways to protect against Hackers Asia Catalyst Version (Year Published): Pages. Date Accessed < http://asiacatalyst.org >. Antivirus Team .2012 BEST SOFTWARE PRODUCT . 2012. Acessed <
http://anti-virus-software-review.toptenreviews.com/> Kindler , sarah . Buying expensive anti-virus software wont stop cybercrime . 2012 . Acessed <

http://conversation.which.co.uk/technology/anti-virus-softwarecybercrime/>

Вам также может понравиться