Consumer reviews and reports on scam companies, bad products and services
Cifric LLC - Ned Cifric - Alexis Cifric
Consumer Protection
29th of May, 2011 by jack111
This threat has been an on-going concern for web browser developers and security experts for the past five years. It is a very serious threat because it involves you and me, the victims when a hijacker takes over the computer without us even knowing what hit us. Watch out for this scam!

Hackers can easily snatch up all the cookies in the jar. HTTP cookies are the reason we have anti-spyware, and weaknesses in the wall against attack from invaders. They leave a trail of information, since they are basically text files saved by the web browser, a hacker can follow the trail towards sensitive, personal information saved from the internet. Here is a couple tricks the hackers will use to pull your pants down, no one wants to be caught with their britches hanging out in the wind, so Geek Choice will tell you how to prevent this from happening too.

Session Fixation: A session is when you log onto the internet, either through LAN or Wireless. The fixation is sending a link that will set the users session id once the user logs in. Once this is done, the hacker has easy access to that users computer.

Sidejacking: This is a common attack from hackers where they sniff out the packets of information being sent back and forth between two parties and steal the session cookie. While many sites encrypt the login password at the homepage, the rest of the site is often unrestricted, allowing hackers to intercept the information that the user might think is secure yet little does he knowa hooded, sniveling little junior high genius knows this is his in, his entrance into your computer. WiFi are vulnerable and are perfect for hackers to run around hijacking your browser and stealing all the files you thought were safe.

Cross-site scripting: Another widely used and widely damaging attack by hackers who want to hijack your computer is by a trick. The trick is by fooling the computer into thinking the code is trusted, meanwhile it is malicious and once in your computer-devastating.

Man-in-the-Middle: The worst one of all. Lets set the stage for this attack: Two people are involved in a private conversation online about matters that do no need to be heard by anyone else. On the side is a third party, an unknown party that could benefit from the information being said between the two people. All the third party has to do is wait for one of them so send the public key, and once that is intercepted, the third party can impersonate the two people and take complete control of what is talked about. Scary. The best way to prevent this is to put passwords on public keys so that when you are using WiFi, it is not open for hackers to jump right in.

We talked about the different types of hijacking, now lets talk about preventing them.

Use a long, random number as your session key, this stops the hacker from guessing the key through trial and error. Encrypting your session is a good way to waylay attackers by creating complicated algorithms that will make the sensitive information only readable to you and others who have the key.

One simple and easy tip that Geeks in Minutes will leave you with: Log OUT! Beware of Scams!

Post your Comment

Complaint Details


Get new code


 

Recently Updated Reports

1
344 days ago by thestoryofdianegerrish
goldendoodle world - goldendoodle world lake ridge kennels Vulgar,...
I just came across this page a few minutes ago. I am Sandra Johnson and although this page was...
2
569 days ago by freeinfofraud
Bitky.io - Unable to withdraw funds
Bitky be Aware! Unable to withdraw money! Bitky idoes not allow you to withdraw your funds, do...
4
573 days ago by ned l.
Bi Polar Bullies - Bi Polar Bullies Kennel Karen Wolfe BUYERS BEWERE OF THIS...
thank you for bringing this to my attention...my name is Karen Wolfe, i'm the owner of...
7
574 days ago by ned l.
ServiceMagic ServiceMagic scams and cheats contractors...
Jason - I'm sorry to hear about your experiences with your leads recently. The leads that...
     

User Registration

Already a ScamExposure.com member? Log in now.
Username
E-mail address
Password
 
Get new code

User Registration

A confirmation email was sent to "".
To confirm your account, please click the link in the message.

If you don't see the email in your Inbox, please check your Spam box.

User Login

Not a member of ScamExposure.com? Register now.
E-mail address
Password
Forgot your password?
E-mail address
Back
Loading, please wait...
Your password has been sent to the specified email address. Log in