Summary

This chapter has discussed non-invasive ways that hackers use to disable or to disrupt target systems. Whether they use fake connection flooding, buffer overflow crashing, or DNS spoofing, hackers can make your life miserable. Furthermore, although these types of attacks do not let the hacker in, they might be used in conjunction with other attacks to gain unauthorized access. For example, a hacker could hammer at your firewall, conceivably keeping the firewall so busy trying to sort data that it is rendered useless. This could theoretically enable a hacker full access to your system.

Statistically, a hacker is more likely to use your computer as a slave to attack other machines, rather than as a target itself. However, this is little ...

Get Maximum Wireless Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.