The internet is ever growing and you and I are truly pebbles in a vast ocean of information. They say what you don’t know can’t hurt you. When it comes to the Internet believe quite the opposite. On the Internet there a millions and millions of computer users logging on and off on a daily basis. Information is transferred from one point to another in a heartbeat. Amongst those millions upon millions of users, there’s you. As humble a user you may be of the Internet, you are pitted against the sharks of the information super highway daily. Problem with that is the stealth by which it happens. Currently about 30-40%. | HACKING SECRETS REVEALED Information and Instructional Guide HACKING SECRETS REVEALED Production of S C Enterprises Table of Contents Disclaimer Trojans 29 Introduction i Joiners 34 ICQ 34 CHAPTER 1 System Intrusion in 15 Seconds 1 Chapter 6 Access Granted 36 CHAPTER 2 Bank Account Information 37 The Trojan Horse 1 Email 39 The Hack 15 Pictures 39 NewsGroups 18 Resume 39 Grapevine 18 Survellance Via Internet Connection 40 Email 19 Un-Safe Websites 19 CHAPTER 7 IRC 19 How To protect Yourself 42 ChatSites 19 Firewalls 43 Antivirus Software 44 Tips Tricks 45 CHAPTER 3 Protecting Shared Resources 49 Acceptable Files 20 Disabling File and Printer Sharing Oh No My system s Infected 55 59 Readme Text Files 20 Chapter 4 Chapter 8 Who are Hackers 24 Every Systems Greatest Flaw 60 Anarchist Hackers 24 Chapter 9 Hackers 25 Crackers 26 How to Report Hackers 65 Chapter 5 Tools of the Trade 27 Chapter 10 Portscanners 28 Final Words .