Data Koncepts

Security

Data Koncepts

Security

  • Home Page open submenu
    Data Koncepts'
      Home Page
  • Webmaster open submenu
    Professional
        Webmaster

    Development
        Process

    Small Website
        Fixed Price
        Offer

    Website
        Clients


    FREEBIES:
    Webmaster Security
        (see Security)

    Search For a
        New Host
        Checklist

    Search Engine
        Optimization
        w/mod_rewrite

    mod_rewrite
        Code Generator

    E-Mail
        Encrypter
  • Web Hosting open submenu
    Web Hosting
        Info
    & Checklist
    Web Hosting
        Offer
  • Security Updated! open submenu
    Online
        Security

    SuperScan v2New!
        Attack
        Detection
        & Reporting
    Hack Recovery
  • Professional Services open submenu
    Professional
        Documents

    Digital
        Imaging

    Screensavers
  • Computers open submenu
      Hardware
      Software
  • Contact open submenu
      Contact
      Terms &
        Conditions

      Sitemap
Website monitor by killerwebstats.com

Freedom Lost! Freedom!

Security

Be alert for hackers!

Due to the increase in the number and sophistication of hacking tools, "script kiddies" are discovering the perverse "joy" of defacing others' websites while serious "blackhat" hackers use those tools to gain access to networks to:

  • Steal assets (client lists, formulas, credit card data, etc.)
  • Conduct Denial of Service (DoS) attacks to prevent authorized users from accessing their server, database, important documents, etc.
  • Use YOUR computer to attack other assets (Distributed DoS attacks, SPAM or just to steal your bandwidth)

I won't identify the tools used (they're too easily found already) but I will tell you how to mitigate the risk of being hacked:

Strong Password Definition, Requirements and Guidelines

A strong password is a password that meets the following guidelines:

  • Be seven or fourteen characters long, due to the way in which encryption works. For obvious reasons, fourteen characters are preferable.
  • Contain both uppercase and lowercase letters.
  • Contain numbers.
  • Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | \ < , > . ? /
  • Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption works).
  • Not resemble any of your previous passwords.
  • Not be your name, your friend's or family member's name, or your login.
  • Not be a dictionary word or common name.
  • [Added by Talonz] Not be a significant or personal date.

These guidelines were found at http://strongpasswordgenerator.com

  1. NEVER leave default installation files and passwords! Hackers know the defaults and use them to gain easy access to others' assets.
  2. ALWAYS keep your operating system (Windows or Linux or Mac) patched. New vulnerabilities in operating systems are discovered nearly every day and OS creators rush "patches" to their clients to try to plug those holes.
  3. ALWAYS keep your applications patched, too. Applications are often a favorite target because of the lack of security in the rush to get the application to market ("never enough time to do it right but always enough time to correct the errors").
  4. ALWAYS keep your communications secure. This means that your Internet connection is also vulnerable to the same patch problem.
  5. ALWAYS keep your antivirus program up to date with patches and virus definition lists. Once "malware" (malicious software) gets on your computer, it can spread rapidly throughout your network!
  6. ALWAYS use a STRONG password (see sidebar to the right) and change your password often (every 30 days is recommended) and do NOT keep it written down where others can find it!

If you need YOUR computer or network evaluated, please use the form on the Contact page.


 
  This site designed, created, maintained and copyright © 1995 - 2025 by Data Koncepts.