HACKING SECRETS REVEALED
Information and
Instructional Guide
HACKING SECRETS REVEALED
Production of S&C Enterprises
Table of Contents
Disclaimer
Introduction
i
C H A P T E R 1
System Intrusion in 15 Seconds
1
C H A P T E R 2
The Trojan Horse
1
The Hack
15
NewsGroups
18
Grapevine
18
Email
19
Un-Safe Websites
19
IRC
19
ChatSites
19
C H A P T E R 3
Acceptable Files
20
Readme & Text Files
20
Chapter 4
Who are Hackers
24
Anarchist Hackers
24
Hackers
25
Crackers
26
Chapter 5
Tools of the Trade
27
Portscanners
28
Trojans
29
Joiners
34
ICQ
34
Chapter 6
Access Granted
36
Bank Account Information
37
Email
39
Pictures
39
Resume
39
Survellance Via Internet Connection
40
C H A P T E R 7
How To protect Yourself
42
Firewalls
43
Antivirus Software
44
Tips & Tricks
45
Protecting Shared Resources
49
Disabling File and Printer Sharing 55
Oh No My system's Infected
59
Chapter 8
Every Systems Greatest Flaw
60
Chapter 9
How to Report Hackers
65
Chapter 10
Final Words
74
DISCLAIMER
The authors of this manual will like to express our concerns about the misuse
of the information contained in this manual. By purchasing this manual you
agree to the following stipulations. Any actions and or activities related to the
material contained within this manual is solely your responsibility.
The misuse of the information in this manual can result in
criminal charges brought against the persons in question. The
authors will not be held responsible in the event any criminal
charges be brought against any individuals misusing the
information in this manual to break the law.
(Note This manual was created for Information purposes only.)
3
Introduction
HE internet is ever growing and you and I are truly pe