Hacking the Internet user: other
SSL : overview, use the 128-bit encryption (most countries now). Potential fraud: bypassing the certificate validation. Click on lock to see certificate.
IRC hacking: not only message exchange, but also file exchange. Users connect to a reflector (BNC, IRC Bouncer or proxy server), making the tracing of IRC users fruitless (a plus for hackers), all you get is the BNC IP.
- DCC Send and Get connect directly two IRC users and allow file exchange, what makes easy to an user or worm infected user to distribute malicious code.
- Countermeasure: if you need to use IRC, run anti-virus on the directory you selected as default for DCC downloads , and read more about IRC security.
Napster hacking: as a distributed file-sharing network, it has the potential to distribute Trojans, viruses, disguised as MP3 audio files. Napster checks headers and frames to see if the files are MP3 files, but Wrapster disguise files as MP3. Similar services may also be vulnerable.