Hacker attacks from the network to your computer
Nowadays, there has been an attack on the computer of people who are accessing the Internet. These hackers use some software to search (Scan) all computers online. (Figure 1)
Figure 1 In the picture above is an example. In the first column, the names of the computers detected by Hacker are online. Notice the third column RS. If the computer has YES in this column, it is likely to be attacked. In case hackers want to attack them, just click on your computer's name and you will see the information in your computer and they can steal or delete it. The advantage of this form of attack is that hackers do not need to install a virus into your computer, at any time, they can search for some computers that are online to steal information and this happens. Quickly, you don't know that people are stealing information on your device. Prevention: To avoid being attacked by Hacker in this case, do not share any resources when you are online (Figure 2).
Figure 2 In case if you are forced to Share disk resources (For some companies) it is best to set the password when sharing resources.


5 ★ | 1 Vote
You should read it
- How to Become an Information Technology Specialist
- How to search for free online resume
- eBay focuses on online shopping platform
- Security tips for Google, Facebook and online services
- Pluralsight free 7000 online courses at home including Photoshop, Premiere, C ++ ...
- Build an online community with the Community Server
- Control of resource terms
- How to Find Out a Password
May be interested
- India's largest IT services company is hit by a hacker 'the giant in the field of providing it services in the world's second most populous country, wipro ltd, based in bengaluru, karnataka, india, has become the latest name and also the most lucrative. join the list of businesses that are victims of phishing attacks in 2019.
- More than 1.7 billion cyber attacks in 2013mobile is a fast growing it sector. in 2013, security issues around mobile devices have reached a new level of increase in both quantity and quality. if 2011 was the year the mobile malware started to attract attraction to hackers, then in 2013, these malicious software became more complete and sophisticated.
- Vietnam Hacker forum was paralyzedfrom the beginning of june until now, the vietnam hacker forum has been twice denied service attacks, making it impossible to access the website.
- Hacker was jailed for 2 years for DDoS attacks against Skype and Googlea 21-year-old was jailed for two years after being accused of conducting ddos attacks on high-tech companies such as skype and google.
- Warning: DDoS attacks are becoming more dangerous both in scale and complexityalthough ddos is a new form of attack, it is always considered as a leading threat to organizations and businesses worldwide.
- White-haired 'monsters'hackers 'white hats' combine a passion for research, discovery and fighting against underground forces that always seek to destroy. in this article, we will return to the original hacker definition and explore the world of white-hat hackers.
- 17 skills needed to become a hackerto become a professional hacker you need a lot of knowledge in both engineering and information technology. here are 17 skills you will need to have if you want to be a good hacker.
- Russian Hacker calls for attacks on Georgiasecurity yesterday (august 12) officially denied information that attacks targeted georgia's website in recent times.
- 10 most famous hacks of all time6 lines of code are enough to blow away $ 10 million of a business. the other 99 lines of code set up the first internet virus (worm). the telephone network of the whole city is controlled only because a hacker wants a fashionable car ... the systems that are considered to be the best security have been penetrated.
- Alarming statistics on the situation of network security in our country in the first half of 2019the number of cyber attacks on our country's computer systems in the first 6 months of 2019 had a record increase.