Online – 10 Hackers Tricks Messing With Your Online Banking.

I’m taking a rest after this but hey, before doing that – better put up this entry for everyone. Some might want to said that this kind of entry have flood the NET. But, this is my blog and I want to put it in, no matter what other might says.

People are haunt by electronic break-in, hacking, and cyberspace fraud for many years, which one of most hottest topic in news and blogs – Online banking threats. What consumers really have to know are how the hacker’s games or tools in their road toward tarnishing people’s life. We should remind ourselves on how they do their works. Read below list:

  1. Phishing Scam
    Phishing scam is the classic form of identity theft. It occurs when a person receives an official-looking email aimed to fish your personal information by false pretenses. For example, the message can ask recipients to change their passwords or resubmit contact information due to the bank’s technical problems.Links in those emails will redirect you to websites that look and feel like the authentic banking  sites. Scammers recreate pages using information and logos from legitimate websites in hopes to fool consumers. If you enter your account details into them, the information will go directly to the criminals.Avoiding phishing scam is simple: don’t click on links in e-mails that ask you to provide your personal or financial information online. Call the banking company if it appears to be from or open up a separate window in your browser, type in the official address of your bank and navigate the site on your own.
  2. Teaming up with an insider.
    A US Treasury Department analysis indicated that over half of all reported computer break-ins involved an insider. One type of insider is a person who finds weaknesses unknown to system administrators and uses this information to access online accounts.
    Another type of insider finds a job at the bank specifically to commit a fraud. People who work in the customer assistance department may try to steal consumer information databases. Law enforcement officials investigating computer crimes often tell that they find passwords even on Post-it notes stuck on the employees’ monitors. Other criminals join technology staff to find a glitch, bug, or vulnerability in the network and software.
  3. Using a worm or virus.
    Viruses like Trojans can be caught by downloading programs you think you need or clicking on a link to a greeting card of video that arrives in e-mails spam. Or, you can pick viruses up by visiting a web page that’s been corrupted by hackers.If you get infected with a virus, the data on your PC will be recorded and sent to the hacker automatically. Viruses can hide silently inside your computer only to activate once you enter information into specific websites, like banking sites.Then they steal usernames and passwords by copying the log-on page or capturing keystrokes.So-called man-in-the-middle Trojans are more advanced. They can make fraudulent fund transfers while the victim is on the banking website. Another type of new viruses can make a copy of the web page showing account balances, but the amount will be changed so the user will see what he or she expects to see.If you want to avoid catching worms and viruses, a suspicious eye and up-to-date anti-virus software can help. You need to be careful about where you surf on the Internet when you are not banking.
  4. Using malicious software on public computers.
    The scam typically begins when a hacker installs keystroke-monitoring software on any public computer to obtain customer login names and passwords. Fraudsters can even get a temporary job in a library, hotel business center, Internet café, airport, etc. to simplify this task.Then hackers wait until anyone types in the web address of online banking account, user name and password. All keystrokes entered on the computer will be recorded by the malicious software and e-mailed to the hackers’ PC.This emerging Internet fraud is a new version of the widely used phishing e-mail scams, in which spammers send out mass e-mails containing hyperlinks to fake websites.
  5.  Stealing passwords.
    Password theft, password cracking, and even password guessing are still serious problems. Computers can process large amounts of data in a relatively small period of time. It is estimated that financially-motivated hackers can guess passwords at the rate of 1 billion guesses a second.Dictionary attacks, hybrid attacks and brute force attacks are various methods used to guess or crack passwords. The only real protection against such threats is to use multilevel authentication or very long passwords. A 5-character password will take 10 seconds to guess, 6 characters – 1,000 seconds, 7 characters – 1 day, 8 characters – 115 days, 9 characters – 31 years, 10 characters – 3,000 years.
  6. Exploiting default settings.
    If a target network uses the defaults set by the manufacturer or vendor, it is much easier to attack it. To see the scope of this problem, just Google “default passwords”. You will find a lot of websites that list thousands of the default log names, passwords, settings, access codes and naming conventions for various types of software and hardware.That’s why one of the most effective and simplest security precautions is to change the default settings to other alternatives. You also need to pay attention to the installation defaults like path names, folder names, components and configurations. If it is possible, consider all options for customization.
  7. Attacking wireless networks
    Wireless networks provide a lot of benefits, for example freedom from wires and the ability to be mobile within your office or home. However, hackers find it easier to make DOS, interference, hijacking, eavesdropping, man-in-the-middle, spoofing, and other attacks in wireless networks.You will need more time and efforts to secure wireless networks than to deploy a traditional wired network. In addition, many organizations have discovered that workers have brought in their own WAP and opened up security holes in wireless networks.
  8. Gaining access to the servers.
    Some hackers prefer attacking the hardware itself. They exploit attacks-prone Web systems to take control of the servers running the bank’s online operations, for example Microsoft IIS (Internet Information Server) or Unix Web servers.By gaining access to the servers through security holes, a hacker can modify any trusted applications to perform fraudulent operations. Such internal applications probably won’t be noticed by the network’s security system.
  9. Using back door’s  programs.
    A backdoor program allows the hacker access to your computer, bypass normal authentication , get full access to every facility and file on your computer (including your bank account’s log name and password) and send this information to the hacker’s PC.The backdoor could be an installed program (e.g. Back Orifice), or a modification to an existing program or hardware device . A specific form of backdoors is rootkits,which discloses the presence of other users, programs, services and open ports.
  10. Monitoring vulnerability researches.
    Hackers often read websites, blogs, discussion boards, and other sources of public information to learn more about bugs, issues, and vulnerabilities with hardware and software. Their aim is to find about possible attack points before users and companies become aware of this bug.To combat vulnerability research on the part of the hacker, you have to be just as vigilant as the hacker. Keep watching on discussion groups and web sites to learn about problems in order to protect against them just as intently as the hacker is looking for problems to exploit.

With all that risks, threats, and vulnerabilities existing in IT environment, 100% online banking security is just a dream. Keep in mind that hackers are looking for the easiest way to penetrate into online banking systems, and they know that the biggest security hole is usually sitting between the keyboard and the back of the chair.

 

p/s: Read also my entry on “Meets Identity Theft Crisis Freak Outs

Online – Advertise Your Website and Bring Traffic With Free Viral Marketing Techniques Within 7 Steps.

I would rather built up my personal website manually. I dunno what other might says cause this is what I most like about self-branding. Make up friends, acquaintances, and prospects  base on honesty and belief is crucial for me. If you intent to make your step do follows this 7 steps below:

Step 1
We all know that word of mouth can be the best way to spread the news about something new or something cool. This is the concept behind viral marketing–someone passes something on to a friend or colleague and it makes its rounds without any work from you. This is what we’re going to focus on–how to do something once and have the product speak for itself.

Step 2
Compiling information into an eBook and selling it (or offering it for free, of course!) can be a great way to bring people back to your site. You will establish yourself as an expert in the subject and provide great free information for your consumers, and by adding links to your website for “more information,” your customers will be checking back on your site more often than not.

Step 3
If you can do programming, or know someone that can, it would be a great idea to offer a small, simple utility program that can be of interest to those that visit your website. For example, say you have a blog or website about eBay marketing. Maybe you could offer a program that shows customers the top-selling items of the day. Something along that line. Something that people could pass on, share, blog about in their OWN blogs and send traffic your way.

Step 4
Everyone knows YouTube, and if you create videos that relate to your website and offer them on your page and also use YouTube to direct traffic to your site, you’ll be sitting pretty in no time. YouTube offers alternatives for people to “pass it on” quickly and easily to their friends and coworkers, which saves you the work of trying to “pass it on” yourself!

Step 5
If you know how to make Flash games, make a simple game that relates to your website. Be sure to keep your logo and website address prominent throughout the game so people remember it!

Step 6
Write, write, write! Write about your topic. Write blogs, articles, anything that verifies that you know what you’re talking about, your knowledgeable about your subject and then use this free material to link to your website. If people are intrigued by what you have to say, they’ll be clicking that link near the end to see what else you’ve got to share!

Step 7
Make materials that can be freely distributed among your customers. For example, if you have a website that is for teachers, create some free printouts that they can use in their classroom. Or if you’re a website focused on new mothers, create printable checklists for what to bring to the hospital or what to register for at the store. Simple things like this can be shared–just be sure your logo and website are prominent on these printouts, so your customers know how to make their way back to your website!

p/s: Sometimes you can make your own personal step after experiencing it yourselves.

Online – Twitter In One Word – SUBJECTIVE!!

Wondering why people making such fuss all about Twitter?

What is Twitter main goal toward micro-blogging?

Is it really matter what Twitter can give?

Does people wasting their time instead searching for money in Twitter?

Can we judge that Twitter is bad or good; evil or justice?

DOES EVERY SINGLE QUESTION REALLY MATTER?

My point is simple – When the user of internet reach almost ‘Billion’ or already over the par ( I don’t know you tell me!!), do we have to bother about judging almost everything out there? What are your opinions?

I never judge thing with self-prejudice, instead of thinking of ‘its’ possibility. So, my personal point of view – Twitter is SUBJECTIVE (an entity that cultivated by users).

P/S: Everything in this world follow the same rule!! Twitter will be what it really are depends on people within. Each of every individual out there have their own unique ideal goal with Twitter. So, just let them be. It just that simple .

Online – Hate To Say, But It Is A Must – SOMETHING About Page Rank!!

I hope for people who do read this, please do acknowledge that it have nothing to do with provoking or being sarcastic. You have all right either being agreed or disagreed with this post!! It takes me quite some time to construct word by word hoping for others to be optimistic and open mind toward it!! I’ll try to make it short and simple for other to understand!!

Brief Story About Page Rank
Page rank is a trade mark of Google inc. which known as the best search engine provider at this time. Shocking fact about this page rank, this application is patent under assign of Stanford University. Being the lead association which planning to provide many advance facilities in the near future have make them made this somewhat “page rank” thinggy!! [more]

Straight to the point about page rank, which firstly release with Google Tool bar on “enable option” application under some rules and regulation of disclaimers!! Then, Mozilla Firefox officially equips this Google Tool bar with the page rank feature into their browser!! Further action had been taken by open source side, which make their own version of page rank using Google API!!

Then, the story of new era start its journey!!

Brief Opinions Of Mine On Page Rank
From here on, I’ll go with my own opinion base on the source I found in Wikipedia about page rank!! Refer the list below:

  • Page rank uses link as votes
  • Google’s ” rel=’nofollow’ ” proposal
  • Google tool bar page rank
  • False or spoofed page rank


Page rank uses link as a votes
Sound interesting though but still there is something fishy about it, really!! Hurm, lets make it in in two aspects of pro and con. I does like the idea of link as votes, but is it necessary? It just that what I learn about votes, there never a 100% good percentage of votes for every single thing… Answer it honestly.

Some site might added you and it feel really great to acknowledge that!! Think again, when somehow, somewhere and somewhat occasion take action which your link have been add on hazardous or malicious site!! [more]

What is your perceptions? Do tell me…

Google’s ” rel=’nofollow’ ” proposal
Come on… Do you ever thought of using this method? Vast major site maybe, but how about us; small name, newbies and nobody in the NET. Think again if you want to use this method.

When the first time I think of this method, wow what a dangerous act to be done, especially for people out there whom call their self as blogger’s!! Why? Maybe you should brainstorm “the mind” about what is the function of track back?

Simple code with vast “Dark Vader” within… ho3

Google tool bar page rank
Do you ever drop by into some unwanted url, read the site and wondering why its have PR more than your interesting site? Hurm…..

This feature can be found in additional toolbar provider site, but best and much wiser is just download it from Google inc. Official and install it within your toolbar, much easier isn’t it? Now, that is for viewer!!

How about site or blog owner? They might use PRchecker and much more!! Somehow, it is important to indicate your PR in case for viewer whom don’t have it within their browser to differentiate your site!!

Note: PR will not indicate your true popularity cause sometimes its varies depending on many factor!! Base on Matt Cutts of Google inc. [more]

False or spoofed page rank
Easily manipulated!! Wow with caps, never thought that Page rank can be done with that manor. Seem hard to do for us beginner, but remember there are lots of hacker expertise on the NET!!

It seem that somehow, there is a person out there might doing this action to their unworthy site or blog for us to come in and attracts more visitor, where they only put ads and malicious thing inside.

Read more about 302 Google jacking and you’ll know what is the message i’m trying to send to you!! [more]

Personal opinion
PR seem important to many bloggers out there, which is an important fact to acknowledge!! When, I read this facts from wikipedia, I realize that PR is only one of NET component, nothing more than that…

Interests, Ambitions, Concepts, Ideas, Determination, Creativity and Trademark are much more important cause visitors can only educated with the list I stated above then just a mere number on the PAGE RANK!!

I know what is the meaning of its, because it takes me 4-5 days only to make this post with educate words of my limited wisdom and fact from reliable source!! Now its depends on visitors to differentiates it!!