0ad 1983 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1st Person 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 Games 2d 2x0ng 3d 3d game 3D Games 3D modeling 3rd Person a las barricadas action Action Games action rpg action-adventure Adventure Games agentkeeper aim alien alienarena amiga amiga cd32 amnesiac hero an rpg that actually takes place in the present day ancientbeast and now I'm in a sewer Android Games annex-glest-mod antargis arcade Arcade Games ardorcraft arewealone arkane arkham art article arxendofsun arxliberatis assaultcube AtomicGameEngine award ball-rolling bananabread based on a book based on a cartoon or anime based on a comic based on a movie based on a tv series batman bge bioware Blackvoxel blender blendswap bloody flying enemies bombable boulder chase breakout clone broken sword bubble bobble bullet bullet hell bullfrog bushidoblocks bygfoot Call Of Duty Games capcom Card Games cartoon cutscenes castlevania cataclysm cel shading character name the anthropomorphic mascot hero child game Chocolate Doom christmas codecombat collect 'em up commercial community conquests contest-gamedev core design corebreach creativecommons Cricket Games crowdfunding crowdsourcing crystalspace crytek Cube2 cyberspace daft dagon damsel in distress dark forces darkmod darkplaces data dealer dc deadmorning deceiver delicious health-restoring snack food devcorner developer commentary dhewm3 Diablo difficulty select faces digitised actors dinosaurs disgaea disney distorted parallel ghost dimension divinity Doom Doom3 dos double fine driving Driving Games drm bullshit duckmarines dungeon siege dungeons and dragons eatthewhistle ecksdee electronic arts emiliapinball engines erebus escoria escort mission event-conference extremetuxracer FGD fighting game Fighting Games final fantasy first person brawler first person shooter First-person shooter flare flightgear food world Football Games forgotten realms FPS Freeablo freegamer freeorion frogatto Full version Games game engine GameDevelop games gas powered games genre-adventure genre-buildingsim genre-cards genre-defense genre-educational genre-engine genre-exploration genre-flighsim genre-fps genre-mmo genre-platformer genre-precision genre-puzzle genre-racing genre-roguelike genre-rpg genre-rts genre-sandbox genre-shooter genre-space genre-spacesim genre-tbs gigalomania girlfriend rescue glamour GLSL godot gold star for not being crap good game Gorynlich Grand Theft Auto gsoc GTA guest post h-craft hack and slash hacking minigame hedgewars heretic hero of allacrost hexenedgeofchaos hexoshi Hidden Object hive horror Horror game Horror Games html5 i finished this one i hate clowns i take my orders direct from the king iceball id software idtech2 idtech3 idtech4 indiana jones Indie indiegogo intellivision ioquake3 irem ironbane irrlamb irrlicht jaleco james bond 007 james pond jedi knight jediknight jihaus jme jmonkey3 jrpg keeperrl Kelgar kickstarter success story konami krysalis Lamiae legend entertainment lenar less than 1 GB Games less than 100 Mb Games Less than 200 MB Games less than 300MB Games Less than 400 MB Games Less than 500 MB Games Less than 500MB Games level complete flagpole liberated pixels cup licensing lincityng linux linuxgameawards lipsofsuna List of Games live action fmv logo with a sword through it love lucasarts lugaru l�ve l�ve2d mac mario mass effect mecha-neko media players MegaGlest Metroidvania might and magic mighty rabbit minetest-c55 mission game Mission Games MIT mode-multiplayer mode-onedevicemultiplayer mode-singleplayer model viewer monkey island monolith Moonshades movie mozilla mystery adventure naev natsume NBA 2K series NBA live Series Need for Speed neverball NFS nihon falcom nintendo nintendo game boy nintendo game boy color nintendo gba nintendo nes nintendo snes nippon ichi nova pinball obsidian occulusrift octaforge ogre3d oh wow this platformer starts on a forest level olpc Open World Games open-source openart opencaesar3 opencity opendungeons openflashpoint openfootball opengameart openig openjk openmw openra openxcom origin osx Other overdose Overkill OW ows patreon paws menu pc PC Games people can fly photo editor software physica pinball pirates pixel art platform-android platform-html5 platform-ios platform-java platform-linux platform-osx platform-symbian platform-webgl platform-windows platformer platinum arts sandbox playstation playstation 2 playstation psp pleethebear point and click adventure portrait-marathon possessed hero post-apocalyptic PotM princess rescue probe programming projectfootball projectofthemonth PS 3 Games Puzzle Puzzle Games quintet racer racing Racing Games rail shooter rainbowrooms ransom rats in the basement raven software Real-time tactics redeclipse remake resident evil Resident Evil Games retux revolution software ritual rockstar north roguerepublic Role Playing Games Role-Playing Games ROTC RPG RPG Games rts RTS Games run and gun ryzom saints row sam and max sandbox sauerbraten scifi screenshots of the year scrolling beat 'em up sdl sealed the monsters away for a thousand years sega sega genesis-mega drive sega master system sega mega cd shameless advertising shiny entertainment shiny metal logo shoot 'em up Shooting shooting gallery Shooting Games shunnedsurvivor sierra Simulation Games skullplosion skyriot slippery ice world Small Games Soccer solarus space space combat Space Games space marines space station 13 spacenerdsinspace spectrum holobyte spinning background cogs sport platformer Sports Sports Games square standalone star trek star trek 50th anniversary celebration week star wars starts with the ending of the previous game stealth stealth action Stealth Games steam strategy Strategy Games Strife stuntrally style-historical style-retro style-sci-fi stylish black and white visuals Subway Surfers game summerofcards sunsoft superpowers supertuxkart surprise it's a stealth level Survival Horror sweet game SWF Games systemshock tactics taito tales Tales of Maj'Eyal TBS td telltale Terasology terminal-overload Terra Centauri Tesseract The Castle Doctrine the music is stuck in my head theskyofverdun they took all my guns theyearning third person shooter Third-person shooter Time Management tol tom clancy's ToME top editing software torque2d torque3d tournament towerdefense tremulous trolls turbografx-16 turbografx-cd turn based tactics tutorial ultima unkillable protagonist unknownhorizons unreal unvanquished Urho3D valyriatear vdrift vdrift-ogre vehicular mayhem veraball vic tokai video villainous protagonist voice says the title volition vote voxel warsow warzone2100 wesnoth windows wins the prize wolfenstein wordwarvi world war 2 worldforge Wrestling Games wtactics WWE wyrmsun xbox 360 XBOX 360 Games xonotic ya3dag yodasoccer you get to drive a giant mech you get to drive a submarine ys ysoccer zelda zero-k zombies


The threat of black hat hackers has never been greater than now, considering the increasing organization of their efforts to make a dollar off of your digital assets and information. The common portrayal of the hacker is someone who knows enough about programming and the internet that they can seemingly access any information or know anything about anyone.

This is mostly an exaggeration. Finding information on someone is still work, sometimes very time-consuming and usually not worth the effort from a financial standpoint unless done on a large scale. It does beg the question, however, of how much hackers might know about you. Based on the trails you leave online and who you trust your information with, a hacker might already have a file with your name on it. It is a question worth investigating.

Public Network Usage

How often do you use dangerous public networks to conduct online transactions or communicate with others? If you use them at all without protection, you leave yourself open to data interception. Hackers will often hang out in cafes or other public places with WiFi and use a �sniffing� device to take in the traffic of anyone unfortunate enough to be sending and receiving data over the network. Think back to what you�ve sent over a public network. Anything you sent or received could very well be in the hands of a hacker.


The best way to protect yourself on a public network (other than not using it) is to equip your device with a strong Virtual Private Network (VPN). A VPN will connect your device to an offsite secure server via an encrypted connection, allowing you to keep your information a secret from anyone hoping to look on. As an added benefit, your IP address will be masked by that of the offsite server, so you will be able to avoid tracking in that manner as well.

Large Scale Data Breaches

Do you know if your information has been leaked in a large scale data breach such as the Office of Personnel Management attack or the Target credit card scandal? If so, you might not have been immediately targeted for an attack, but it doesn�t mean that the information has vanished from the internet. For the right price, that data (or large sets of data containing your information at a wholesale price) could be sent to an interested party. Some might not apply anymore, but with the right information, you could be traced.To prevent this sort of thing in the future, the most you can do is choose the right organizations to trust your information to. Try to lobby for stronger standards of cybersecurity with the businesses you use and the government. You can�t control organizations, but you can control who you trust.

What Do You Keep on Your Computer?

Much of what black hat hackers do involves malware and using it to gain information on you. While some malware acts more like ransomware or a portal to let other malware in, other malware (or the same malware as a secondary measure) collects whatever information it can from you and sends the data on to its creator or owner.

If you�ve ever been the victim of malware, a lot of what you keep on your computer could be known by a hacker. Make sure that you try to avoid shady websites and use the best tools you can such as a high quality security suite to keep malicious programs off of your precious devices.

Privacy and Social Media Presence

Even if you keep your social media accounts safe, a hacker could use them to find out important information about you. Privacy is important to fend off malevolent hackers in a world of sharing.


Consider the following:

If you tag your location in a public post often enough, they might be able to get a general idea of your routine.



If you don�t make your accounts as private as possible, a clever hacker might be able to use your public communications with your friends against you and deduce some of your movements and activities.




Even things such as the time of day you post can say a lot about you. A skilled hacker can use even the most basic information such as this to help build a plan to scam you better.




Doing a quick Google search of yourself online is a great way to determine how private you are online. 


If you can find it out through Google, have no doubt a hacker can find out the same information.



This is clearly a difficult question to answer for certain, but hopefully by this point you have a better idea of what to look out for and what a hacker could know about your personal life and what information they could have. You aren�t defenseless, but further vigilance regarding all of your online activities is required.

Do you think there are any other factors to consider when trying to figure out how much a hacker could potentially know about you? Are there any other tools and methods of protections you would recommend? Please leave a comment below with your thoughts on the matter to continue this conversation.

Disclaimer: This tutorial is only for educational purpose. The author or the blog owner is not responsible for any kind of misuse of this information provided.

Author Name

Contact Form

Name

Email *

Message *

Powered by Blogger.