Windows Tips & Tricks
(Windows 98, ME, NT, 2000, XP and Vista)

What Hackers Know That You Don't - Part One
Windows All Versions

This is not a tip to teach you to be a hacker. This is a tip to make you aware of things you might not know - but hackers do. The more you know what lurks out there on the Web the less you'll be afraid of the boogeyman. Sometimes the bogeymen you imagine skulking around the in the dark are pathetic creatures when exposed to the light of day. Our goal is to shine the light on these "bogeymen" so you can see what you're up against. Knowledge is always your best weapon.

Let's cover three things that hackers know that you probably don't. We'll show you a couple tools hackers use, and we'll show you where they get them. Please don't download these kinds of programs. They are very difficult to use. Besides that, we have not checked them and we don't know if they are full of badware, malware or spyware. The only goal of this tip is to let you know that there are things out there you probably never knew existed. And you can will see as your read more of this article that there are some pretty nasty stuff floating around on the Web. But then again, if you read the news, there has always been some pretty nasty stuff floating around in the real world too. It's nothing new. But the odds are in your favor, you are very unlikely to ever see the cyber-bogeyman.

Hac/king Web Sites
There's a tool called ObiWan. It is a password-stealer. It is used to crack passwords of password-protected sites and servers. That means that all of us who have Web sites are vulnerable to this sort of software. Many Web sites are hacked every day. But you may never hear about them because they are not the popular sites you probably know.  Sites get hacked all the time - and every once in awhile it happens to a very popular site, like the Super Bowl site last January.

Hackers use tools like ObiWan to crack sites. Then, they can, if they wish compromise the files on those sites. Then innocent folks like us come along and download something unexpected. A trojan perhaps. Maybe a virus. Maybe a tricky piece of spyware. That's why it's so important that you keep your anti-virus and anti-spyware up-to-date. It's also important that you have more than one anti-spyware program on your computer. And, it's a good rule of thumb to say away from off-the-wall sites which exist on the dark fringes of the Internet, such as por/n sites, gambling sites, known adware/spyware sites, and other not-so-nice sites. We cannot put a link to the ObiWan site in this newsletter simply because so many ISPs would probably censor this newsletter. If you really feel a need to learn more about it, do a Google Search for ObiWan password stealer (leave the forward slashes out, of course).

Harvesting Email Addresses Like Yours
Many of us get lots of sp*am. Sp*am has become so much a part of Internet life that we have come to take it for granted. We wish it wasn't that way. But, then again, we wish people wouldn't murder each other. We wish that peace on earth would become a reality. We wish that young children wouldn't ever have to go through a terminal illness. Wishing, unfortunately, doesn't do much good but prove that wishing doesn't do much to change the way things are. (Aren't you glad we go off on these philosophical tangents right in the middle of an article about Hac/king?)

If you've ever wondered how that infamous lot we refer to as "spamm/ers" get our email addresses so easily, we're going to tell you some software applications used by spa/mmers called "harvesters". We'll also touch on a couple other ways they get your email addresse(s).

A "Harvester" is a program that "spiders" Web sites looking for email addresses. Any email addresses it finds in those web sites it collects and stores them in a database. Among these addresses may be yours and mine. Some of you have personal Web sites. Did you know that when you include a link so people can contact you, your email address is vulnerable to harvesters? It is inevitable that an email harvester will come along at some point and "spider" your personal Web site or Web page and "harvest" your email address. You might sign a guest book and include your email address as part of your "comments". The Harvesters will get it. And entire Web sites can be "spidered" and email addresses gathered from them in a matter of seconds. Email addresses are all over the Web. On Web sites, on mail servers, on ISP hard drives. Harvesters can spider thousands of Web sites in a very short time and gather up every email address it finds.

One tool that is not specifically an email harvester, but has the harvester's capability of extracting all email addresses from Web sites, is called "Blackwidow". And there are dozens of others too. Blackwidow must be a very popular one, because many hackers and spa/mmers seems to recommend it. In fairness to the developers of "Blackwidow", the program was not meant to be used as a hac/king tool. Once you read more about it, you'll see why hackers love it.

Email addresses are bought and sold like any other commodity of value. Spammers make millions of dollars a year spa/mming people. And, furthermore, it's easy to do. Easy money is a very hard-to-resist lure for those willing to take the risk. While most sites, that require your email address to sign up for something, have strict policies about selling or sharing your email addresses, others such as spyware and adware makers do not. You don't think a spyware/adware maker really cares what you think, do you? They're already doing unethical things by using your computer as a billboard and extracting data from you, so why would you think they'd not make a ton of extra money by selling your email address or "sharing" it with others? If not spa/mmers they'll share it with their advertisers. And these advertisers then might share it with spa/mmers. Valid email addresses are worth a lot of money. One sure way of increasing your sp/am is to allow adware or spyware to reside on your computer. If you like sp*am, install a lot of adware and spyware. You'll have a feast of sp*am in a few months.

Here's another way your email address ends up in a spammers hands: Did you ever subscribe to a magazine where they ask for your email address, so you fill it in? Did you ever look closely at those sign-up postcards? Most don't have any privacy policies stated on the subscription postcard you fill out and send in. What do you think will happen with your email address in those cases? Well, one thing that could and probably will happen is that your email address will be sold to "email marketers".  Then these email marketers will sell lists of millions of email addresses (including yours and mine) they've purchased to sp*ammers. It might not be the primary company you give your email address too that will increase your sp/am, it will be the second and third line companies who buy addresses from the company you trusted with your email address. When sp*ammers buy lists of millions of valid email addresses, they sell these lists to other sp*ammers. And you know where this all ends. It ends with your inbox full of sp*am.

One important note: There are many fine companies that will not share your address or sell your address for any amount of money. They don't share their mailing lists with anyone. We have never shared our lists with anyone and we never will. Beware of the companies that say the won't share your email address with any third party without your permission. What constitutes permission is the catch. "Permission" when used in that way, can be anything. It's subjective. Beware of sites that say they won't share your address without your permission.

Virus Construction Kits

You can go to Home Depot and buy a kit and build a greenhouse or a storage barn. Kits are handy ways for those without all the skill necessary to build things from scratch, to build storage barns, greenhouses, etc. from kits.

But, would you be surprised to learn that there are sites out there selling (and giving away) Virus Construction Kits? Indeed there are. And, they're not hard to find. If you are a miscreant with some computer skills but not enough to build a virus/worm from the "ground up", a Virus Instruction Kit can help you build a virus or worm. After you've built your brand new virus or worm, and added your own personal "touches", they will even tell you how to disseminate it, so you can infect the largest number of computers in the least amount of time.

Here's a good explanation of Virus Construction Kits from Addison-Wesley:

"Virus writers continuously try to simplify the creation of virus code. Because most viruses were written in Assembly language, writing them remained out of reach for many kids. This inspired virus writers to create generators that can be used by just about anyone who can use a computer.

Virus construction kits evolved over the years as viruses targeted new platforms. Construction kits and virus mutators were built to generate a wide variety of malicious code, including DOS COM and EXE viruses; 16-bit Windows executable viruses; BATCH and Visual Basic Script viruses; Word, PowerPoint, and Excel viruses; mIRC worms; and so on. Recently, even PE virus code can be generated by such kits....." (Read more here.)

You'll be thrilled to know there are such things as Trojan Construction Kits too!

Knowledge Is Always Your Best First Line of Defense

We wrote this article, not to scare you, but to inform you. There are billions of computers connected to the Internet. The chances of your computer being singled out for attack is small. The chances go up dramatically if you install adware or spyware. Or if you visit the "wrong" kinds of sites (and you know what I mean). Or if you click links in emails and you aren't sure where the email came from.

Knowledge is a great thing. The more you know the safer you are. Still you need to keep a good anti-virus program installed and updated. You should make sure your anti-virus program is updated at least once a week. You should install at least two good anti-spyware programs. At least one of them should be commercial-grade like Spyware Doctor. Spyware Doctor can detect and remove most keyloggers. For a secondary anti-spyware program we recommend Spybot Search & Destroy which is free.

But more than any program you can use, and more important for your safety, is educating yourself and learning how the dark side thinks and how they operate. And that was the main thrust of this "tip".


Registry Mechanic - The only Registry Cleaner, Fixer, and Optimizer that we trust to run on our own personal computers.Registry Mechanic - A Cloudeight Endorsed Product
Download A Free Trial of Registry Mechanic by PC Tools

With Registry Mechanic you can safely clean, repair and optimize the Windows registry with a few simple mouse clicks! Problems with the Windows registry are a common cause of Windows crashes, slow performance and error messages. By using a registry cleaner regularly and fixing registry errors your system should not only be more stable but it will also help improve your system performance without expensive hardware upgrades. Download A Free Trial of Registry Mechanic by PC Tools

Registry Mechanic uses a high-performance detection algorithm to quickly identify missing and invalid references in your Windows registry. These problems can occur for many reasons including being left-behind after the un-installation or incorrect removal of software, by missing or corrupt hardware drivers, or orphaned startup programs. Download A Free Trial of Registry Mechanic by PC Tools

With a few easy steps Registry Mechanic will scan your entire registry for any invalid entries and provides a list of the registry errors found, you can then choose to selectively clean each item or automatically repair them all. For your convenience and protection Registry Mechanic can also make a backup of any repairs made so that you can easily recover any changes if required. Try it free now! Download A Free Trial of Registry Mechanic by PC Tools


Spyware Doctor. Save 20% on this Cloudeight endorsed and recommended product.Spyware Doctor - Save 20% Right Now!

Spyware Doctor is an advanced adware- and spyware-removal utility that detects and cleans thousands of potential Trojan horses, keyloggers, cookies, spy bots, and trackware, spyware, and adware programs and other malware from your PC. The remover tool allows you to remove, ignore, or quarantine identified spyware. It has an option to immunize the system against hundreds of privacy threats and can perform fast detection on Windows start-up to alert you with a list of potential threats. Learn more about and try Spyware Doctor right now - free! If you decide to purchase Spyware Doctor, you must use the special Cloudeight 20% OFF coupon code on this page in order to get the discount! Spyware Doctor is Cloudeight recommended and endorsed and has won numerous industry awards!

Scan your computer and find out if you're infected. The scan is completely free.

Make our Start Page your Home Page   |   Close this Window








The above advertisements are provided by Google. Content of these ads is the responsibility of Google, Inc.