"What to do if I was cracked"

"What to do if I was cracked"

As it is regrettable, but it is possible to crack almost everything today: e-mail, the account in payment service provider, on the website, on social network. It is sometimes connected with loss of money or important information. Unfortunately, not all know what to do to the victim and how to secure itself against similar situations in the future.

 


Actually what to do?

A set of actions of the owner of a stolen property is very limited. He can:
- try to restore the lost control independently;

- contact for the help technical support;
- contact the malefactor for negotiations;
- contact other hackers for the return theft (it is possible too);
- create the new account.



If theft of the account is connected with loss of a large number of money, there is a sense to contact police to find and punish the criminal. All these actions do not guarantee success therefore prevention of similar incidents in the future will be useful.

Magic word

The password from a resource should be difficult that it could not be cracked with a brutforsing method (search). It is desirable that it consisted of 8 characters or more: digits, lowercase and capital letters. The password should not represent any word on any layout. Otherwise it will be easy for malefactor to make the so-called "attack according to the dictionary". Digits should not consist of the password on any date.

The password cannot be stored on own computer. Otherwise the malefactor connected to him under the telnet protocol or the unfair service worker who is making repair or prevention and having direct access to a resource will be able to read it and to use information.

It is the best of all to store the password in the head (if memory good) or somewhere on paper, and not near the computer. You should not press the button "remember the password" that the stranger who got access to the computer could not crack it. Upon termination of use of a resource, it is always necessary to click "leave". Especially it is important if work was performed not on own computer.

Confidential question

Sometimes at registration it is offered to enter a confidential question and the answer to it together with the password. In terms of safety it is quite vulnerable way of data recovery if the answer is too simple. Whenever possible best of all than everything to select the option of a question, such at which it is possible to enter an accidental combination of characters (without having forgotten it to write somewhere). The accidental combination of characters will be the answer let too.

Binding to the cell phone

The ideal solution in terms of reliability. In case of loss of control over the account it is enough to begin the procedure of recovery only. Necessary data will come in the form of the short message of SMS to the specified phone. It is necessary to protect the device from possible theft and if it after all happened, it is necessary to block immediately, and then to restore a sim card at the operator and to declare in police.

Remember data

The personal data specified at registration should be true, otherwise in case of cracking it will be difficult to prove the property right to the stolen account. It is necessary to remember the following information also: The IP address from which registration, and IP from which the last input was made was made. Besides, it is necessary to control quantity and names of folders of letters on it given about the message of the last sender, the contact list of a box.

After registration in payment service provider it will be required to monitor the movement of money on the account or in a purse, to remember or write attributes of last transactions (date, the addressee or the sender, the sum). Also the screenshot – the picture of a desktop at the time of registration on any resource will not prevent. It is also necessary to be ready to the fact that for obtaining the certificate or restoring access it is necessary to send scans or paper copies of the passport or other document proving the identity.

Antivirus and other knowledge of safety

The working computer should be reliably protected by the good (not free) antivirus software with often updated bases and the correct security settings. It is necessary to be careful of the suspicious websites on the Internet - with doubtful content and "curve" design and also not to download unchecked programs.

It is not necessary to specify the login and the password anywhere, except the page of an entrance to the used resource. If somewhere the password is requested repeatedly, probability is high that it is so-called "fake", specially created, similar to real, the false page for theft of the password from the account. It is necessary to leave urgently this website, to clean cookies, to correct the hosts system file, to check the computer an antivirus.

 

Author: «MirrorInfo» Dream Team


Print