DI-701 Internet Server/Firewall
Frequently Asked Questions (FAQ)
Question #9: How do hackers attack my computer and what does the DI-701 do to prevent it?
There are different types of hackers in the Internet community. Some do a service of testing security schemes for the purpose of helping electronic security to improve. Others may concentrate their efforts on the challenge of breaking into difficult systems. Still others simply break into computers to steal information, destroy systems, or mask their activites.
This third type of hacker is the one that is most likely to attack your home computer(s). Typically these malicious attacks are not aimed at an individual, but are ultimately random in choice of victim. The hacker is most often not educated or terribly sophisticated in terms of their computer knowledge. They hack for the "fun" of hurting unseen people and use canned, pre-built programs that are widely available via the web. They may attempt to destroy your files and computer, or they may steal information. In some cases they will set your computer up to help them attack another computer or system.
A typical attack involves some very simple techniques and a few downloaded programs to execute. Normally these types of hackers are not targeting a specific home user, but instead are looking for easy-to-crack computers. These hackers will usually start by scanning a large block of IP addresses looking for open ports. They will log this information and come back later to actually try to break into a system.
An open port means that a program on your computer is waiting to receive information from the web. When you have File and Printer Sharing enabled, for instance, a specific port will be open on your computer. This port exists to handle requests for access to your computer's files and printers. Hackers using a port scanner will see this port.
Other applications on your computer may have ports open as well. Some applications may be invisible to you and may actually be Trojans. Trojans are small programs that can provide a host of services to a remote user. Trojans are typically installed by accident when a user downloads a file from the Internet, or opens one in their email. Like a virus, a Trojan can be transferred from one computer to another and is typically designed to hurt the computer on which it is installed.
There are a number of types of Trojans, with new ones appearing each month. The simplest may just record keystrokes from your keyboard and stream them to a hacker. The hacker can then learn all of your passwords and any information you provide in email or via the web including personal information and credit card information. More advanced Trojans are able to give hackers remote file access, remote system access, or may contain actual destructive routines that can wipe out your hard drive, corrupt files, or destroy your computer's BIOS.
All Trojans have to use at least one port, and common Trojan ports are well known to hackers. Hackers will sometimes find installed Trojans while they are scanning. Naturally any computer with a Trojan is a prime candidate for attack.
The DI-701 does a couple of key things to protect your computer:
It hides the IP addresses of the computer(s) attached to it. This means that a port scanner will scan the DI-701's open ports, not your computers. As a first line of defense, this will stop you from being marked as a potential victim by someone who is looking for an easy target with a port scanner. It is similar to a house alarm or large dog that will make a burglar look for another house to rob instead of yours.
The DI-701 also blocks ports. This means that a port may be open on your computer(s), but the open port will not be accessible from the Internet.
The DI-701 does not use a computer operating system. This means it cannot run software beyond what is factory installed. This prevents a hacker from using the DI-701 to relay attacks.
Question #10: Why do Computers using a Cable Modem or DSL Modem get attacked more often?
Cable and DSL Internet connections provide a couple of key benefits. They are fast and they are always on. Both of these facts make them attractive to hackers as well. A fast connection means that the hacker can access your files faster. The always on connection allows them to access your machine at times when you are less likely to notice. Large blocks of IP addresses used for Cable and DSL Internet access are well known to hackers and are targeted frequently as a result.
Top
|