How Hackers Take Control of Your Computer

| Total Words: 465

Your PC has many “ports” which are vulnerable to attack from a hacker. These ports are used to communicate internally with your monitor or printer or externally to the internet. For example, Port 25 is used for receiving incoming email and Port 80 is used to connect to the internet.

In addition you have a unique IP number which is assigned to your computer by your Internet Service Provide which is required for you to use the internet. This is how you send and receive information. It also serves as your computer’s “address”. The IP number looks like this – 106.185.21.243.

If you have a broadband or DSL connection your IP address rarely changes which make your computer more vulnerable. If you connect to the internet via dial up then you typically are assigned a new IP address every time you log on, but this doesn’t been you are not vulnerable to attack! Another issue is that with broadband connection you are likely to be on line for longer periods of time giving hackers more opportunity to attack you.

Hackers use “port scanning” software to hunt for for vulnerable computers with open ports using...

To view and download this full PLR article, you must be logged in. Registration is completely free. Once you create your account, you will be able to browse, search & downlod from our PLR articles database of over "1,57,897+" on 1,000's of niches and 200+ categories without paying a penny. Click here to signup...

** PLR to VIDEO: Create Awesome Videos From PLR Articles... FAST!...