Kross (เครื่องยิงจรวดต่อสู้รถถัง~
Group Blog
 
<<
กรกฏาคม 2552
 1234
567891011
12131415161718
19202122232425
262728293031 
 
27 กรกฏาคม 2552
 
All Blogs
 
Computer security expert faces challenges of success

Computer security expert faces challenges of success

BY ELIZABETH BASSETT
July 27, 2009

Ankit Fadia, an independent computer security consultant, author and hacking expert, shared his views on technology security and the hacker world with guests at the Gail Davis & Associates Inc. “Power of Inspiration Day,” a free event featuring guest speakers to commemorate the Colleyville-based company’s 10 years in business.

Fadia, 24, grew up in New Delhi, India, had a computer in his home when he was 10 and became interested in hacking when he was 12, he said.

“People say the forbidden fruit always attracts,” he said, and he taught himself various hacking techniques through his own research and trial and error. When he was 14, he wrote his first book, The Unofficial Guide to Ethical Hacking.

Ethical hacking, Fadia said, involves being commissioned by a company, organization or individual to try to hack into a computer system or network as a way to assess the security of the system. This diagnostic type of hacking is useful for identifying weak spots, he said, but other types of hacking are illegal. As people have become more reliant on technology – through ATMs, smart phones and computers – they also have become more forgetful of the security aspects of these devices.

Fadia spoke with the Business Press prior to his presentation to the audience gathered for the event. Following are some topics he discussed and his suggestions for safe-guarding one’s self while on the Internet.

Fadia’s reputation

Fadia first made a major name for himself when he was tapped to help break an encrypted e-mail message sent by an Al-Qaeda member after Sept. 11, 2001, he said. After that success, he said, he has been involved in studying e-mails and other Internet messages sent between various Asian countries, and his work has spurred a backlash against him.

There are numerous impersonators of him trolling the Internet, Fadia said, and he’s gotten death threats by phone and e-mail. He said some have doubted whether he has accomplished what he says he has, because much of the work is classified, but the ill will comes from the fact he was young when he was successful as well as the nature of hacking itself.

“Computer hacking is a very competitive field,” Fadia said. “ . . . I never claimed I was the best hacker in the word.”

Fadia deals with detractors by ignoring them, he said, and focusing on his own work, which includes computer security classes he created to certify technology specialists. He also is working on a book that would detail his work with government agencies, he said, and offer an in-depth look at what he’s done. The book will hopefully be out within the next year or so, he said.

Hacking

“No matter what you do online, it’s being watched,” Fadia said.

During his presentation, Fadia explained that almost every search engine and every e-mail program monitors what a user does and stores records of activity. When someone is connected to the Internet, he or she also is vulnerable to spyware and Trojan horses, which let another person monitor everything being done and captures the information, like passwords or credit card information for online purchases. One infected computer, like a laptop, also can spread security weaknesses to others; for example, if an infected personal laptop is connected to a system at a business, then the entire business’ network is at risk.

“Computer hacking is fun, but computer hacking has expanded into a lot of other areas as well,” Fadia said, noting that Bluetooth technology on smart phones and navigation systems in cars open the doors to hackers. ATMs also can be hacked into, he said, and some less malicious hacking also is becoming easier, like those who hack into electronic roadside signs. In January, roadside signs near Austin were hacked and displayed warnings like “Zombies in area! Run” and “Nazi Zombies! Run!!!”

Protecting computers

There are ways to safeguard computers and other technology, Fadia said. Turning off Bluetooth capabilities on phones and other small devices helps keep out intruders, and using firewalls, antivirus software and antispyware programs will help on computers, as will updating a computer’s operating system every other week.

“Security changes every single day,” Fadia said, and so updating to battle new viruses and malicious programs is crucial.

Strong passwords, including letters in upper and lower cases, numbers and special characters are essential, and users should avoid using the same passwords for everything or using passwords that have been used before. A key scrambler will keep spyware from recording what is being typed, and public computers should not be used for banking or shopping or anything else that uses important personal information and passwords.

Being cautious when using the Internet will safeguard users and networks, Fadia said, but even the best intentions can lead to mishaps.

“The biggest loophole in computer technology right now is human error,” he said.


Source: //www.fwbusinesspress.com/display.php?id=10677


Create Date : 27 กรกฎาคม 2552
Last Update : 27 กรกฎาคม 2552 23:17:16 น. 0 comments
Counter : 657 Pageviews.

ชื่อ :
Comment :
  *ใช้ code html ตกแต่งข้อความได้เฉพาะสมาชิก
 

Kross_ISC
Location :


[ดู Profile ทั้งหมด]

ฝากข้อความหลังไมค์
Rss Feed
Smember
ผู้ติดตามบล็อก : 79 คน [?]




Blog จับฉ่ายของ Kross ครับ เทคโนโลยี, การทหาร,Military Expert, การ์ตูน, Anime, Manga, Review, Preview, Game, Bishojo Game, Infinite Stratos (IS), Hidan no Aria, Light Novel (LN)

ติดตามเพิ่มเติมได้ทาง Twitter ที่ @PrameKross
New Comments
Friends' blogs
[Add Kross_ISC's blog to your web]
Links
 

 Pantip.com | PantipMarket.com | Pantown.com | © 2004 BlogGang.com allrights reserved.