(1 ) to the information on the network monitor
(2) risk to the copy of user identity
(3) to the information on the network distort
(4) give to the information that issue deny
(5) undertake weighing sending to information
To general commonly used inbreak the method basically has
1. Countersign inbreaks
Alleged countersign inbreaks, show with a few software unlock has gotten namely but be added close countersign documentation, it is OK that nevertheless a lot of hackers already used a kind in great quantities steer clear of or the program that screen countersign protects will complete this work. OK to those unlock or the program that screen countersign protects are called normally “Crack” . As a result of these software wide to circulate, make inbreak computer network system becomes quite simple sometimes, do not need to understand internal composition of the system deep very much commonly, it is the good method of abecedarian.
2. Trojan horse art
Respecting Trojan horse, want to know the person of this story is not fathomless only, its most typical method may be one can help a hacker finish some the program of specific action depends on in some in the normal procedure of lawful user, at this moment the program code of lawful user already was changed by this. Once the user sparks this program, so the hacker instruction code that depends on inside is activationed at the same time, these code often can finish the job that the hacker assigns. Because this kind inbreaks,law need hacker has very good process designing experience, and should change the competence with want code, certain, master harder so. But the complexity because of it, general systematic manager discovers very hard.
3. Listening law
This is one very practical but the hacker with very big also risk inbreaks method, but still a lot of inbreak systematic hacker uses this kind of method, alleged art tall person is audacious.
The communication between network node or workstation is pass iformation flow transmit be able to come true, and collect line should be done not have in implement in the network, the transmission of data does not have the direction with specific demonstrate, at this moment each network node or workstation are an interface. This is just like some node to say: “ hey! Who there is in you is the workstation that I want to send message. ”
Previous12 3 4 5 6 7 8 9 10 11 Next