Beware of Hackers!Author : Pandu Ranga Rao N
E - Mail :

Before computers came, the word hacking was referred to an act of breaking a large piece of wood into smaller pieces, by using a large axe. It was also used for mercy killings, where a man will be made to die by chopping off his neck by another man.

Today, man went on inventing something new, useful stuffs. Among these inventions, the computers stand on highest level. Being a machine, it is more powerful, accurate than human brain! This sensational craze has of course, led to many inventions and thus computer network was born. The invention of computer network has in turn raised a very useful stuff, which is of course, the Internet.

Use of internet has brought significant, rapid changes to the global economy. Today, we cannot live without using internet. A day without internet is almost a dead day, today. Some people used internet for information exchange and information interchange. But, some crazy people found some means to exploit the weaknesses to steal information from other computer. And thus word the hacking was given a place in computer science words dictionary, vocabulary. Thus, Hacking is a method of stealing information from a computer system using illegal means. The person who does hacking is called as an Hacker.

The hacker sits at the remote system, normally, do, try to penetrate into other system or into the network, by using some special software, meant for penetration process. Through it, hacker can collect vital information such as credit card details and also personal information. After collecting the vital information, the hacker will black-mail the system owner and can demand ransom or some favors which amount to illegal black-mailing. Hackers need not target a particular user. They can target many internet users.

Hackers need not get support of the softwares meant for hacking. They can also use other methods, such as guessing work such as guessing passwords, guessing card numbers, etc.

Today, majority of users who are in internet, are prone to hacking. Among them, email services sites, social networking sites are among those which are hacked. Normally, we get some useful stuff in the social networking sites, like facebook, twitter, google + etc.

I, as a Facebook user, almost daily, getting apology private messages saying that, the account got compromised and somebody posted some porn video or some illegal contents, through that account, and asking users to apologize for the same. By this, messages, I got inspired to write this article. Due to ill literate computer users, this crime, has gone to some greater extent, and in turn, encourages users to learn computer handling in a cleverer way.

Here, are the some tips for users of social networking sites like as well as the users of email and chatting services such as,, etc.

  1. Never share your ids and passwords through any means in the internet.
  2. You may be using your nick name in password. Never, disclose your nick names to unknown friends.
  3. Never disclose personal details like date of birth and some important dates which you may remember.
  4. Now days, mobiles play important role in providing security to your account. Setup a SMS alert, by registering and linking your mobile number to your e-mail account. This feature will alert you, in case of logging by some other person from another computer.
  5. Never trust a person and also never trust internet to be secured and never tell every bit of your life to him, in internet.
  6. Some websites operates through a layer of security. But, always remember that, your information is not at all secured, even though the website providers say that they are sending your information through secured layer, where your address bar URL consist of https// instead of http://. So, don’t send a copy of important documents through internet. Ask the person to come and collect it personally in case of sending a copy of most important documents such as house documents, etc.
  7. For the email accounts, keep changing passwords, once in six to twelve months. This will make your account, less vulnerable to hacking.
  8. Keep the system up to date, with all downloadable latest updates from operating system’s official website. Also, keep your antivirus, anti-spyware, anti-phishing softwares upto date. This will minimize the possibility of hacking.
  9. Do not visit games websites, unknown websites, frequently. Some of these websites do contain codes to send information internally, without informing the user of what is being sent.
  10. Always do not keep webcam switched on. Better to disconnect it from the computer itself, if it does not have ON/OFF switch. Such webcams do keep themselves ON when the computer boots up. Though one may say that, it is not possible to switch ON web cam without the present user’s interaction; there is one mere possibility that, it can transmit live video without notifying the users to the hacker.

From this, I am sorry, if it makes you to get scared! But, truth is always a bitter pill to swallow. Now, you may think, we cannot trust internet world. This is true to some extent. Once you are connected to the internet, you are in the most unsafe world, even though it is announced that, we provide you the most secured way of life. Finally, it is upto you to decide about your safety.

Author : Pandu Ranga Rao N
E - Mail :
  About Team ProgrammingBasics.In

Contact Team ProgrammingBasics.In

Instructions for submitting your own article

About Team ProgrammingBasics.In

Right now, we are a small but, dedicated team who strived day and night to alter the pretty old into a new conceptual website "The ProgrammingBasics Foundation Library".

The articles and topics in the website are the major contributions of freelancers, programmers across the globe. We thank each of them for their valuable contributions. You can also become a contributor by sending some software related articles to us. We will publish it in our website. Instructions for the same are given in the "Instructions for submitting your own article" page.

Contact Us

ICan Technologies,
HIG 44, 23rd Cross, 8th Main,
E-Block, Vijayanagar 3rd Stage
Mysore-570017, Karnataka, India

Mobile: +918050239039

Instructions for submitting your own article

Want to become an article contributor to this site ?

If yes, then send us an article written by you on your own words, neatly typed in MS Word document. If we feel that, you have written the article by using some other article then we will reject the article. Every article we will cross verify, before we publish them. The right to reject the article is with us.

If you want to publish your name and email id's, specify the same in the document.

NOTE: You must give your consent in the email for publishing your email id and your name. Otherwise, your name and email-ids will not get published. We respect your privacy.

One article per document, which means, you must not send more than one article in one document. Everything in the sent document will be treated as one article and your article will get rejected without looking in, further.

The articles must and should be related to computer basics, programming concepts and programming languages. We will not entertain any other topics. Please bear this in your mind, before starting an article write-up.

Articles published in are the sole property of ICan Technologies, Mysore. You are here in authorizing ICan Technologies, Mysore to take the ownership of the published article. Rejected articles will not be published and you can try to publish the same in other sites. We will inform you the status of your submitted article within 10 working days, from the date of sent mail. If not responded within 10 days, then you are free to try publishing your article on some other websites. We will simply discard them and will not publish them any further. Once we publish the article, you will not be allowed to publish as it is, in some other website. If we find it, then your article will be removed from site and the removal will be informed to you.

Send your articles to with "Article for Publishing" in the subject line.

You must create your own images in PSD (Photoshop Document) only, which is to be supported in CS3 or lower versions. Any animated stuffs, must be in fla files (Flash editable file) and not in any other format and must be readable in Falsh 8.0.

You are now in Computer Basics, Beware of Hackers !