Gaurav Yadav proclaimed:
>    don't fire me down for this unethical questions, 
> i am asking as i am
> really impressed by them.

I am assuming that you mean cracker and not hacker.

> "how do hackers hack the system ?"

They find vulnerabilitites in computers that are connected to the internet
and use these to gain access into a system.

Also read the following books:

Some of the books listed in http://security.oreilly.com/

Cuckoo's egg -
http://www.amazon.com/exec/obidos/ASIN/0671726889/o/qid=952543125/sr=8-1/002-1660830-0209828

> "what all ways they use ?"

There are quite a few.  Typically they scan various mailing lists and
newsgroups to read about vulnerabilities with widely used software such as
httpd servers, sendmail, ftp servers etc.  Typically they use the
vulnerability to make the machine run arbitrary shell commands to create an
open door for them.

> "what all we do to stop them ?"

http://www.freebsd.org/~jkb/howto.html
http://www.linuxdoc.org/HOWTO/Security-HOWTO.html


Thaths
-- 
         "Be patient, son.  A watched car never crashes."
                     -- Homer J. Simpson
Sudhakar C13n http://people.netscape.com/thaths/ Lead Indentured Slave

-----------------------------------------------------------------------
For information on this and other Linux India mailing lists check out
http://lists.linux-india.org/

Reply via email to