|low graphics version | feedback | help|
|You are in: UK|
Friday, 11 February, 2000, 17:34 GMT
A - Z: Hack attack
The world of hacking, cracking and pinging is a mystery to most. BBC News Online sheds some light.
Anti-virus - It is estimated American businesses alone are losing $550m every year thanks to viral programmes. Anti-virus software has become a boom industry as a result. Once a virus has been analysed and its author's unique coding style noted, "signature scanning" software can prevent its further spread. To block new and unknown "strains" so-called "heuristic" software can hunt for suspicious looking files - running the risk of attacking innocent files and missing well-crafted "nasties".
Bart Simpson - Melissa was the first virus to become a household name. Its "primary payload" caused computers to blast out between 50 and 100 e-mails, bringing the networks of several major US companies to a grinding halt. The author taunted victims with the term "Kwyjibo" - a Scrabble-winning word invented by puckish cartoon character Bart Simpson.
Daemons - Not to be confused with the British internet service provider, a daemon is a programme which sits discreetly on a computer, usually doing useful things like logging people on to websites. In the recent Yahoo! case, however, daemons were set up to generate the bogus requests for information. Stands for disk and execution monitor.
Electrabel - This Belgian electricity company was attacked by a cracker threatening to shut off power supplies for two hours. Unimpressed by the company's argument that an interruption would cost lives, "Red Attack" proved their ability to carry out the threat by supplying Electrabel with a copy of the firm's computer code.
Girlies - Hacking for Girlies are a group short on sugar and spice. They plastered the New York Times website with pornographic images. It was reportedly in retaliation against a book written about super-hacker Kevin Mitnick by a Times reporter. (see Kevin Mitnick)
Hacker - Confuse hackers with crackers and you risk offending all sorts of people. Hackers see themselves as noble artisans, studying computer systems and security and using their programming skill to expose loopholes. Intellectual stimulation rather than profit or malice is the motive, they say. Many turn legit and are employed to tighten software or systems.
John T Draper - A pioneer of phreaking. Known as Cap'n Crunch because he was famed for getting free long-distance calls from the American phone system by blowing a toy whistle which had come out of a box of cereal (Cap'n Crunch). Later went on to write the first word processing package for Apple.
Kevin Mitnick - A legend in hacker circles and across the internet community. Once heading the FBI's most wanted list, Mitnick has been accused of every cyber crime in the book. Just released following a five-year prison sentence, he is banned from using computers or even working for any employer with terminals in their buildings.
Maxus - This cracker is credited, as it were, with being responsible for one of the largest internet heists. Thousands of credit card details were reported last month to have been stolen from an online CD shop's database, and Maxus - reported to be a 19-year-old Russian - then told the shop he would publish the information unless he was paid $100,000.
Nato - During the Kosovo crisis, the military organisation's carefully managed propaganda war was rudely interrupted when the Nato website was "pinged" to its knees by hackers - reportedly based in the Serb capital, Belgrade. (see ping)
Orifice - Back Orifice and Back Orifice 2000, are the charmingly named inventions of hackers' group The Cult of the Dead Cow. Designed to show embarrassing flaws in Microsoft products, once installed the program allows a hacker to remotely control your PC.
Quack! - Denial of service attacks, the technical name for the virtual traffic jams of useless data inflicted on Yahoo!, Amazon, CNN, eBay and others this week, make companies into sitting ducks. With IT departments snowed under, crackers can fillet the disrupted network for confidential information.
Routers - Computers which tell all those ones and zeros in cyberspace where they are, and how to get where they have been told to go. The Yahoo! crack used zombie computers to fool routers into sending the bogus information to the sites.
Tracks - By switching between computers and carefully erasing any identifying marks, the crackers were probably able to cover their tracks. But they can be sure that the FBI investigation will be getting out its biggest magnifying glass to look for clues.
United Loan Gunmen - Though woefully deficient in the grammar stakes, this hackers' group recently hit the website of American TV network ABC, replacing the front page with a poorly worded tirade against "old media".
Virus - Strains like the infamous Melissa can of course do horrible things. Or harmless things, depending on how mean the person who wrote the virus is. Where they actually come from is a subject for debate, particularly in internet chat rooms. Conspiracy theorists exonerate spotty teenage stay-at-homes, blaming instead various governments and even the canny software makers themselves.
Wobbler - Don't believe all you read. Feeding off a mix of millennial angst and residual technophobia, Wobbler is just one of numerous virus hoaxes circulating by e-mail. Countless useful hours can be lost attempting to guard your PC from "e-flu", "Irina" and the "Hitler" virus - none of which exist.
X-Force - Hackers don't get things all their own way. US firm Internet Security Systems claim their X-Force team of programmers decoded Back Orifice 2000 in under a day.
Yahoo! - Despite its mighty servers, the popular service was reportedly drowned by up to one gigabyte a second of incoming data in the recent denial of service attack. That's more information than most sites would receive in a year.
Zombies - the computers which attacked Yahoo!'s and the others are thought to be zombies, owned by third parties but taken over by the crackers to send the huge amount of information to the sites. Not to be confused with zombie websites, which have passed their useful life but are maintained as if in aspic.
06 Sep 99 | e-cyclopedia
Cracking: Hackers turn nasty
10 Jan 00 | Sci/Tech
Net thief grabs credit cards
27 Apr 99 | Sci/Tech
Chernobyl virus causes Asian meltdown
30 Mar 99 | Sci/Tech
Melissa virus goes global
13 Jul 99 | Sci/Tech
Virus firms crack Back Orifice
12 Aug 99 | Sci/Tech
Software company challenges hackers
The BBC is not responsible for the content of external internet sites
Top UK stories now:
Links to more UK stories are at the foot of the page.
Links to more UK stories
|^^ Back to top
News Front Page | World | UK | UK Politics | Business | Sci/Tech | Health | Education | Entertainment | Talking Point | In Depth | AudioVideo
To BBC Sport>> | To BBC Weather>>
© MMIII | News Sources | Privacy