Many hackers' techniques depend on injecting malware, spyware and viruses into the target computer in order to capture critical data of activates performed on the computer, such as recording your credit card data when performing a payment process on the Internet. As well as accessing your files.
These days, there are many and excellent software packages that protect our computers from such attacks. But in the another side, there are more professional hackers who do not need any malware or spyware or even to inject anything into the target computer. They rely on your browser(s) and the built-in Windows utilities.
They actually know what the purpose of every exe and dll file of the Windows operating system. So, they are able to hack your computer without noticing by any protection package you have, even the firewall does not consider them hackers.
Two years ago, one of our team has been hacked, some of his private video he found on youtube.com, really we were shocked, how is that ??? we are professional security team and we help many companies to test whether their software packages and equipment are secure enough from hackers attack. And also we have a good reputation in our field.
Therefore, we created a new sub team that combines the most professional in programming and security issues to know how the computer has been hacked.
After along time of researches and hard work, we finally found the answer. Actually, we are impressed with this type of hacking, those hackers are very clever to use such technique to hack.
We can summary their hacking technique as following:
First, they scan your computer for any open port (established) and normally when you use any web browser to browse a website there is at least one open port on your computer, and this open port is for receiving browsing data from the web server.
Then, they send a small script on that port to be executed by your web browser, this script contains commands to run some Windows utilities. So, the script is considered safe by any protection package you use, because it is not malware, spyware or virus.
Now, they establish a connection port between your computer and the hacker computer, and this connection is accomplished by some Windows built-in utilities, therefore, the connection is considered legal from the point view of Windows Firewall or any firewall, because the connection was made from your computer to the hacker computer rather than from outside to inside.
This type of connection is managed under the responsibility of svchost.exe which manages a number of services located on your computer.
Finally, we created a new software that block this type of hacking. It is not an anti-virus or anti-malware or anti-spyware, its only responsibilities are monitoring the current open ports as well as filtering the received data from any script that may lead to open a back door for hackers.
We tested this software on many computers that use Windows operating system, and we found them 100% secure from this type of hacking.
After doing many questionnaires with helping with our agents specially in Europe and Russia, we found many Windows computer users have been hacked with noticing that the most of them use the latest protection software in the market. Therefore, we decided to set the latest version we have of Block Hackers which is 3.1 to be available to the computer end users with a low price that is suitable for all.
Block Hackers 3.1 does not effect your browsing speed, and it runs lightly on your computer and it does not require any additional requirements.