Tuesday, December 14, 2010

【 Weak current College 】 hacker detection index of some common technical analysis



Members of the network management, network security is one of the basic tasks, imagine, imagine a fierce hackers are attacking our toes equipment and network management but no skill to force, then the company information of the company's equipment is what? prevent attacks, the first is to understand the principles, competencies do attack response. Any one of the fiercest hacker attacks the first step is for the purpose of the investigation. Let's look at some common techniques, how to prevent them.

1, need-private clear

Often there are many orders you surprised a lot about your company's sensitive information in a network there, waiting for some coincidence imperceptible. You used for your domain name search through IT Forum? try it! technology staff will often in public forums paste queries may be the answer, mentioned in their company operation of special equipment, they even used their task e-mail address. It is clear that they did not expect hackers will not touch your preferences for the network to identify the type of firewall you probably belongs to the server. In order to prevent this attack, you should strengthen the implementation of a policy is to require your users to stop using their email address in the task of public forums register any information, the company name should be put to use. They still can get answers to your questions, but your toes more equipment would not have been seen throughout the world.

2, online databases and site registration

Another hacker looking for your technical staff the information sites is an online database of IP addresses and site registration. In practice there are four databases, each containing a variety of global go local information. Check in on http://www.networksolutions.com perhaps http://www.arin.net Whois local, see if you can see a list of your company's domain name, title, e-mail, or your phone number of the technical staff. Ideally, you should provide these spheres of common messages to prevent hackers use these employee's identity, to force your users to disclose their password or other sensitive information.

3. pay attention to the file security

A body of junk is another's treasure! in the garbage can for a obsolete, lousy but still effective information gathering techniques, in this technique, the attacker carefully check your garbage, seeking social guarantee number, phone number, user ID, IP address and a password. A policy should be strengthened, requiring employees to destroy any application can be wrong. If you really think that do not have to, so I encourage you to check in to your network printer next to the garbage can, particularly in the IT category. You will be aware of to a hacker?


No comments:

Post a Comment