Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm ) have been hacked maliciously for the purpose of getting all my online sales and transferring it to his/her account. I've learned a valuable lesson that I would like to share with you so as to avoid becoming the next victim for this hacker.
Steps to protect your web site:
1. Don't give out your username/password to anyone else.
Even if it's your own net/web/system admin. Chances are he/she already knows it for he/she can just login as admin to the control panel and look at your password.
2. Change your password once in a while.
It's better to write them down instead of saving them on a hard disk with insufficient firewall protection.
3. Don't use any word that can be found in dictionary or anything that signifies your birthdate, your street number to make it difficult for the hackers to guess.
4. Disable the "Forgot Password" utility on your site. This utility is very convenient to most end users, so fast that it gives out password so easy to for hackers to play with.
5. Make your password question / password answer (the one used to remind your forgotten password) difficult to guess. Treat it as a password. If anyone can just guess it, chances are hackers will start exploring with your account.
6. Make sure you are in constant contact with your web provider so they know your real identity and they can help you out as soon as there's hacking going on in your site.
7. Don't use any irc (internet relay chat) based chat system for it connects to ports 6660 to 6669. Hackers will exploit these ports and will upload trojan virus in your computer that can get your username/password on most of your accounts.
If you are going to use any irc chat system, don't even use it without the aid of psybnc or bnc. For more details and pricing of this tool, email: sales@nabaza.com with Subject: psybnc or go to http://www.nabaza.com/support.htm and post your request there.
8. Don't trust any email (even if it's an email message coming from your trusted friend) message that has .exe file attachment. Chances are it came from a malicious programmer and this .exe file already spreadand infected/duplicated in all email addresses in your addressbook including yours. For antivirus information, go to http://www.nabaza.com/antivirus.htm
Nabaza.comspecializes in building, designing, implementing, managing and maintaining corporate website to boost sales of your company. Email william@nabaza.com for information on functional, dynamic webpage designing with affordable packages. Subscribe for free! http://www.nabaza.com/subscribe.htm
Rebrandable ebooks, software for free
Free Advertising Space
Put Nabaza.com In your desktop
Credit card fraud is a growing problem for online businesses... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Working from home has its advantages, including no commute, a... Read More
Threats we ordinary Web users face online leave us no... Read More
Much has been said on the theory of password protection... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Fishing on the Internet has come a long way. However,... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Have you ever had to call Symantec or McAfee to... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
When surfing the Internet you probably take your anonymity for... Read More
You are at your computer, checking out software on EBay.... Read More
Viruses are, however, not the only malicious software programs out... Read More
A new variation of the Nigerian Scam theme ... Read More
Do you really have to know how feeds work? Not... Read More
First of all we need to get some terms stated.... Read More
Before you enter your name, address or any other data... Read More
Phishing is the act of some individual sending an email... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
There has not been a time in the history of... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
P C. owners are constantly at risk from attacks by... Read More
They're out there. Individuals trying to make a quick buck... Read More
There are folks out there who use their powers for... Read More
Since its birth, the Internet has grown and expanded to... Read More
By browsing a web page, you could infect your computer... Read More
In 1997, I decided after 15 years as a practicing... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
At this point, if you've got the whole "turning the... Read More
So called phishers try to catch the information about the... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
In today's times spyware is a very serious issue and... Read More
If you use emails actively in your communication, you must... Read More
Nowadays more and more people are using a computer. A... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Identity theft is one of the most common criminal acts... Read More
Huge number of spyware software applications are available in the... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
These six ways to prevent identity theft offer you valuable... Read More
If you have used a Windows machine for a while,... Read More
I got a virus the other day, Thursday I believe... Read More
The Message Must Get Through The year is 300A.D.,... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Threats we ordinary Web users face online leave us no... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
First the basic definition of Spyware: It is a type... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Someone recently told me, "You would have to be a... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Many of us have run into an annoying and time-consuming... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
If you constantly deal with bank or electronic accounts, it... Read More
First off I should explain what phishing is. Phishing is... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
If you are wondering how to fight spyware for safe... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Let us take the example of scrambling an egg. First,... Read More
By browsing a web page, you could infect your computer... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
A friend called me one day and asked if I... Read More
Internet Security |