Privacy problems? index network pirates index network pirates

Questions and Answers

  • Who is (or was) the most famous hacker?  Why is he famous?
    The names of hackers are not generally well-known. They usually use pseudonyms, but above all there is a very active community of hackers who keep in constant contact in order to exchange information on weaknesses and how to exploit them. What is more likely to be remembered is the name of the virus, worm or programme created for intrusion, and its effects: for example the worm MyDoom which spread at the beginning of 2004 infected an estimated one million computers and will surely remain in the memory of those who had to get rid of it.    
  • Do we know of any damage or accidents of a military nature?
    In 1997 the "Eligible Receiver" operation was carried out without warning as a large scale simulation to test the vulnerability of the information system and network of the United States Defence Department against possible malicious attacks. A "red team" made up of staff from the department unveiled several safety vulnerabilities, even in critically important infrastructures, and revealed how it was possible to collect vital information using computer technology.
     
  • What can I do to be aware in good time of an attack or infection?
    It is difficult to realise "in good time" that there are virus infections. The important thing is take constant action that prevents attacks and limits the risks, by reducing weaknesses to the minimum.  So it is a good idea to install an antivirus programme and a personal firewall, and regularly update the operating systems and programmes you use.
  • How can I solve problems which might occur?
    Specialised sites describe in detail how to remove viruses and worms. The precise solution obviously depends on the specific type of intrusion you have.   In some cases the drastic but possibly only solution is to completely reinstall your computer. In these cases it is essential to have a periodic procedure of copying the contents of the hard disk onto an independent and separate support, in order to avoid losing forever all the information contained there. So in this case too the solution is prevention.