Internet and Passwords
Internet and Passwords
In the digital age, nearly all our transactions are performed over the internet, be it bank accounts including online transfer of money, fixed deposits, PPF accounts and recurring deposits. Other than this millions of users also give `standing Instructions for transfer of money including EMIs for housing loans amongst others. The use of internet is not restricted to online banking alone but also our obsession with e mail accounts and social networking. The use of social networking and e mail accounts has become an important part of our lives and most of works be it official or personal, we do prefer to work through them as it entails in faster flow of information and avoiding `snail mail. Social networking also helps us in keeping in touch with long lost friends, old mates, relatives and new online friends. It is by far the cheapest means of keeping in touch with everyone. Many sites like Facebook, Orkut, ICQ (short for I seek you) provide many facilities other than just chatting or passing information. Other than this internet also finds its uses in online shopping, storage of photographs, blogs amongst others. We protect all these online accounts by means of passwords, which are known only to us.
1.
2. We are firm believers that our passwords are known only to us and others cannot get any access to the same unless and until we pass on the same information to them. Moreover, we also feel that other people will not be interested in our account passwords since they do not matter much to the world at large. We do hear about `Cracking ( in common terms people know it as `hacking, but hacking is a term used for ethical hacking and ethical hackers do not mean or cause any harm. Ethical hackers hack accounts only to convey to the user that their accounts are not fully protected, whereas `Cracking is a term used for people who `crack accounts to cause damage, disrepute or financial loss). I will be emphasizing about `cracking in short, which affect our everyday lives. 3. The passwords that we all use are not safe. It is scientifically proved that the human mind uses passwords which we can easily remember. In all probability our passwords will almost certainly contain either of the following:(a) Names. For eg could be of self, a family member, past boyfriend/girlfriend, children including nick names. (b) Dates. For eg birthday or anniversary of self or a family member.
(c) Accounts. For eg last digits of bank account or FD account. (In fact, the password for online credit card statements of an international credit card company begin and end with name and date of birth. 4. Though cracking passwords is difficult but certainly not difficult. With help of the above and random usage of the same, passwords can be `cracked. Passwords can also be cracked easily by the following means:(a) Password cracking software. (Generally used for opening password for word, PowerPoint, excel or PDF documents).
(b)
(c) Keyloggers. (They can be used to identify each key pressed on the keyboard, thus, identifying your password, user i.d and any other data you may feed by pressing the keys on the keyboard) (d) PC loggers. In addition to identifying key strokes they can also be used to store screenshots, websites visited. (e) More importantly, such software can also be installed in your computer remotely without your knowledge from any corner of the world and can be monitored as long as you are on the internet. 5. Now, the question is what does one do after cracking a password? How does it help the other person? Is there any way that he can harm me? Well, the answer is YES. He/ she can certainly harm you to an extent we might not like to believe. Read on.the few possible damages could be as enumerated below:(a) The bank accounts can be hacked and the money in your account can be withdrawn without your knowledge. Hawala transactions (illegal transfer of money across nations can be made). (b) Online purchases can be made using your credit card and CVV number without your knowledge. (c) Our mail accounts can be used to send messages or e mails to people you may not know. In fact, they can be used to send e mails to terrorists to carry out terrorist attacks. (d) Photographs can be downloaded from social networking sites and morphed to pose nude photographs, thus, defaming a person. (e) Rude or unwanted comments can be made using your account.
(f) Your email account can be used to transfer sensitive data to/by espionage agencies, thus landing you in a soup thicker than you can imagine. 6. All of the above is not meant to scare you or prevent you from using the internet. The internet is a technological boon to all of us and should be used to its complete utility. All that we need to do is protect our passwords. And for this we need to use the following safeguards:(a) Use a good anti virus software like Norton Internet security/ Mc Affe Internet security / Quick heal Internet security. Do purchase the complete version from the market, rather than using the free versions available over the internet. Remember, the free versions are full of loopholes. (b) (b) Change your passwords routinely, preferably every three months. Do not use names, dates or account numbers as passwords. (Read para
3 above). (c) Do not install any third party software without scanning the same. Generally, all keyloggers and PC loggers can be identified with a good antivirus software. (d) Try not to use the e mail/ social networking sites at office. Most companies use keyloggers or PC loggers to identify if their employees are surfing the internet for personal use during office hours at the cost of work hours and the companys money. (e) PC. (f) Use software to identify if any PC logger or keylogger is installed in your Your passwords should contain the following:(i) (ii) (iii) A mixture of small and capital alphabets. Use of symbols like @ / $ / #. Use of numbers.
(g) Use any word or mixture of the above. The word or password should preferably not make any sense but it will be safer. (h) Scan your PC once in a week.
(j) In the internet options menu, go to the tab general, sub menu browsing history and tick delete browsing history on exit. This will ensure that all passwords and data filled by you are deleted after you finish working. Otherwise data can be stored as what we call cookies. (k) (l) Never click the save password option when you log onto your account. Never use one password for two different accounts.
(m) Never ever store your personal data like bank account details and any other detail which may be personal to you in the computer. If you do, then please encrypt them with a password. Save them in a different drive other than `C drive and also lock the folder. Software is available for the same. Windows `Ultimate has an inbuilt option. 7. Remember, SAFETY FIRST. Happy Surfing !!