• Complain

Maurya - How not to get hacked: Are you safe online?

Here you can read online Maurya - How not to get hacked: Are you safe online? full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2015, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    How not to get hacked: Are you safe online?
  • Author:
  • Genre:
  • Year:
    2015
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

How not to get hacked: Are you safe online?: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "How not to get hacked: Are you safe online?" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Overview: Do you think you are safe when browsing online? Thousands of people are scammed everyday resulting in either their account getting hacked or a huge monetary loss. Your computer might be home to deadly malware keeping track of everything you do. Believe it or not, you are at risk even when you are not connected to internet. How do you ensure that you are not a potential victim in this web of scams? This book will take you through that journey where you will see for yourself the different ways of getting trapped and also how to stay protected from them. After reading this book, you will be confident while using a computer or internet without any worries of getting into any trouble.

Maurya: author's other books


Who wrote How not to get hacked: Are you safe online?? Find out the surname, the name of the author of the book and a list of all author's works by series.

How not to get hacked: Are you safe online? — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "How not to get hacked: Are you safe online?" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Acknowledgement

I would like to thank my parents for making me who I amtoday, my friends who have always supported me. Manythanks to my college who provided me with the platformto learn and grow myself as an individual. Finally I wouldlike to thank my readers to take out the time and read thisbook. I hope you get useful information out of it.

Preface

We live in a world where almost every aspect of our life iscontrolled in some way or the other by technology.Whether we like it or not, we are so much dependent ontechnology that we cannot imagine to live without it.Though it has definitely made our lives easier, suchdependency has some serious repercussions. Security hasbecome so much prominent that companies spend insaneamount of money to protect its data from hackers. Onemight think that on a personal level, it is not thatimportant to care about these things, however nothingcan be fu-rther from the truth. Ignorance is bliss isprobably just the opposite of what I am trying to conveyhere. Because this world of internet is huge and you willfind every type of person here- one who likes you, onewho hates you, one who want to steal every single pennyof yours. Ill give you numerous examples where peoplegot scammed of their hard-earned money so I cannotstress enough on how important this awareness is. It isimportant that we take care of ourselves.

This book will show you exactly how hackers try to attackpeople (not physically) and how you can defend yourselfagainst them. Most articles or well-wishers suggest you tofollow some things without actually explaining why it isthat way and most of the time it becomes over defensive.Just keeping a complex password using unthinkablecharacters and numbers wont save you from hackers. Itis definitely possible to survive without an antivirus if youknow what you are doing. But you have to be aware ofwhy you are doing things a certain way and why that isnecessary. Only then you can consider yourself shieldedenough against the bad elements of this world.

About me

Before starting, it is important that you know about meand where all this holy knowledge comes from, not onlybecause you can catch and blame me if your account getshacked in future, but also because I want to establish a trust between us.

I have done my B.E. from Delhi College of Engineering(now DTU) in the year 2012 (if that matters). I am not a security or networking expert by profession, but I thinkof myself to be more than qualified to educate anyoneregarding online security. By profession I am a softwareengineer and an ethical hacker by hobby. Please dontcurse me for that; fortunately hacker is a misnomer and a hacker is not the bad guy who wants to steal yourinformation. It is a term which got infamous over time.However I will continue to use the term hacker the wayyou think it is to avoid confusion. Personally, I have beento the dark side of hacking without crossing the lines ofmorality and legality, so I know exactly how hackersoperate and what they do to achieve their goals. Thisinside information is very helpful for staying protected inthis online world of scam and fraud.

My aim from this book is to explain you how to stay safefrom any kind of online scam or hacking attempt and toenable you to guard yourself from every possible kind ofattack. I will try to do this without going into thetechnical details, however there are tips in between for thetech-savvy. Whenever you see the Pro Tip title, and youdo not understand the content, do not worry because it isnot intended for you and it is no way a requirement tounderstand the concept. Overall, I really believe that youwill benefit with this information whether you are just a normal computer user, a student or a technically soundprofessional.

Table of Contents
Who should read this book?

This book is for everyone except those who think theycan never be hacked or scammed. Youd be surprised thathow many people think they are smart enough but theyare the first ones to get into a trap. I have seen the mosttech savvy of people being ignorant about basic securitynorms. Even if you are a hacker yourself, I am sure youwill enjoy reading this book and maybe learn a fewthings. This is my first book so I really hope that I do itthe right way by keeping it interesting as well asinformative.

Please note that I will try to use very simple languagewithout dwelling into technical details so that a commonperson without any internal know-how should be ableunderstand it. If something is extremely obvious for you,please dont feel offended.

One more thing I would like to emphasize here is that Istarted this book with the sole motto of spreadingawareness (along with some part time income along theway if it allows). I would like you to do the same bysharing this knowledge with your friends and family andpreventi.ng them from getting scammed in future. Asmuch as I would like you to recommend this book toothers, I would be more than happy if you lend it to asmany people you can. Because thats what we do protectthose who we love.

Who are hackers and what they want?

So, who the hell are these people, and what do they get bydoing those nasty things? The motive behind every attackis different. First thing is to understand the target of theattack. A hackers target can vary from a large or smallcompany, governments, organizations, high net worthindividuals or a common man. Every attack has a motivebehind it. By attacking an organization, I mean takingcontrol over the websites/server and disrupting theservices which the organization provides. So, when a company gets attacked, you might not be able to access itswebsite and the database where all the customersinformation is stored can also be compromised.

The reason for attacking the organizations may be to senda message or to prove a point. Also, companies getattacked for sensitive data their computers contain whichis generally of some monetary value. Some websites getattacked just because they happen to be in a specificcountry which the hacker doesnt like. The reason to hacka common person like you and me may be either to scamfor money

But if you are reading this book, chances are that youdont have to worry about an organization or governmentgetting hacked. So, why would be a hacker interested inyou? Well, here are a few reasons:
-To scam you out of your money. This is the most

common reason. People who want to make somequick bucks and do not care about morality orlegality will play every kind of trick to fool you. Iwill explain how to identify such threats.

-It might a person you know who might try to hackyour account, maybe to just have fun with you orto take revenge against you. In any case, you haveto be very careful.

-To get your computers resources. It might besurprising for you but a huge number of virusesand Trojans actually have a single motive to hackyou i.e. to use your computers resources toachieve their higher goal. For instance, to carryout an attack against an organization orgovernment, a hacker needs CPU power. His owncomputer can give him a limited amount of CPU power. So he creates a virus which spreads inthousands of computer. When your computer isinfected by such virus, your machine becomes a slave which gets involved in the attack by thehacker against his target organization. Whenthousands of slaves attack the target server, itbecomes a powerful tool for the hacker. Also, thehacker hides behind your system and your IPaddress which makes it difficult for the policeauthorities to track him. The situation can beunderstood better by the following diagram.Zombies are the slave computers and the victim istarget organizations server (although technicallyzombies can also be victim)

Some incidents to scare you I am going to share you real life incidents - photo 1Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «How not to get hacked: Are you safe online?»

Look at similar books to How not to get hacked: Are you safe online?. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «How not to get hacked: Are you safe online?»

Discussion, reviews of the book How not to get hacked: Are you safe online? and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.