Subscribe to My Blog

Maintaining Anonymity - First Step To Hacking

Posted by Junaid Sunday, October 17, 2010

Smart hackers want to be as low-key as possible. Covering their tracks is a
priority. In fact, success often depends on it. They don’t want to raise suspicion so they can come back and access the systems in the future. Hackers often remain anonymous by using one of the following techniques:

- Borrowed or stolen dial-up accounts from friends or previous employers
- Public computers at libraries, schools, or kiosks at the local mall
- Internet proxy servers or anonymizer services
- Anonymous or disposable e-mail accounts from free e-mail services
- Open e-mail relays
- Unsecured computers — also called zombies — at other organizations
- Workstations or servers on the slave’s own network


If hackers use enough steppingstones for their attacks, they are hard to trace.

One Response to "Maintaining Anonymity - First Step To Hacking"

Leave a Reply

Popular Posts