Understanding Internet risks
Risks from hackers
127
Initial access
The easiest way for a hacker to access a Windows computer is to use
Microsoft networking. On many computers, Microsoft networking is
enabled so that anyone on the network can connect to it.
Microsoft NetBIOS networking uses three of the well-known ports. These
ports are used to establish
connections
among computers on a Microsoft
network. In fact, they normally advertise the name of your computer over
the local network. This is what you want on your own network, but it is not
what you want on the Internet. Norton Personal Firewall is preset to block
these ports and prevent someone on the Internet from connecting to your
computer using Microsoft networking. If your computer is connected to a
local network as well as to the Internet, you must change some settings to
allow communication with the other computers on your network. Norton
Personal Firewall still protects you from Internet risks while allowing you
to use your local network.
Privilege escalation
Once a hacker has connected to your computer, the next step is to gain as
much control as possible. The steps involved and the results obtained vary
depending on the version of Windows that is running on the target
computer.
On computers running Windows 95/98/Me, once hackers have gained
access to the computers, there is no need for escalation. They have full
control of the computers. Luckily, these versions of Windows don’t have
many remote control features, so they are relatively easy to protect.
On computers running Windows 2000/XP, hackers attempt to gain
administrative rights to the computers. The key to getting administrative
rights is usually a
password
. The hacker can download your password file
and decode it.
Another tactic is to place a
Trojan horse
on your computer. If a hacker can
place a program such as Back Orifice, Subseven, or NetBus on your
computer and run it, it is possible to take control of the computer.
Other Trojan horses might record all of your keystrokes to capture
passwords and other sensitive data. Norton Personal Firewall and Norton
AntiVirus provide two levels of protection against Trojan horses. Norton
AntiVirus protects you from inadvertently running these programs. Norton
Personal Firewall blocks the ports that remote access Trojan horses use to
communicate over the Internet.
Summary of Contents for Norton Personal Firewall 2003
Page 1: ...User s Guide ...
Page 10: ...Contents 10 Glossary Service and support solutions Index CD Replacement Form ...
Page 14: ...Responding to emergencies Prevent future problems 14 ...
Page 60: ...Keeping current with LiveUpdate Run LiveUpdate automatically 60 ...
Page 102: ...Blocking Internet advertisements Use text strings to identify ads to block or permit 102 ...
Page 116: ...Troubleshooting Norton Personal Firewall Troubleshoot Norton Personal Firewall problems 116 ...
Page 140: ...Glossary 140 ...
Page 144: ...Service and support solutions 144 ...