Kimmo Huosionmaa
Access to rooms could get by using fingerprints. The idea is to clean the keys and keyboards before the person comes in, and then the intruder would use those buttons for getting access in the room. The thing, what those persons need is acetone and UV-light, what uncovers the fingerprints from the keys.
Also, the computer program, what calculates the sort of the letters, what can be inputting the system by used keys is necessary. And this is why the hacker must remember to put the special marks in the program, what would calculate the order of the given marks. The mathematical term for the number of sorts is the permutation.
Writing of that kind of program, where the mathematical formula calculates the order of the letters, what are inputting there is not very difficult. Then the program must first input the possibilities to the database, and then simultaneously test every possible order of the marks, what can give by the certain keys of the keyboard.
There are only limits of the numbers and marks, what are used for the access, and if the pin-code is short, the person can use a permutation to calculate the combination, and the permutation of four numbers is not very big. If the hackers have the computer program, what will calculate the of the numbers or letters, would the access to the targeted computer granted in seconds.
The permutation is the number of possibilities, how the line can be sequenced, and then the intruder can test every possibility of the sequence. But the special marks of the number keys are making the break in more difficult. By the way, its possible to program the keyboard emulation program, what can test automatically every possibility of the mark lines, and if the laptop is equipped with this software and install to the targeted computer, would it open quite fast.
Normally the passwords to the system are hard to calculate, but if the hacker would have the length of the password and the keys, what the person has been pressed, would the computer program allow guessing the password quite fast. The thing that the hacker would get the pin code or password happens quite easily if that intruder would allow to input those keys inside the calculation program, what calculates every way, how those letters or numbers can be sort.
The length of the password is very easy to guess, by reading the instructions, and if the two same marks or numbers are not allowed to get twice, the number of the keys, what person has been used uncovers the length of the password, and the pressed buttons can be uncovered by using acetone for cleaning them. And if the last thing, what person does after this is giving the password, those marks what is used is very easy to give the hacking program, what emulates the keyboard, but does the breaking in the system more faster than using the keyboards manually.
But this requires access to the same room with the targeted computer. In fact, the hotels are a good place for this kind of operation, and when the target person goes for breakfast, would this person leave the laptop in the hotel room, and then the hacker can slip in and break the system. And this is the thing, what would not even be noticed. And the data, what hackers would steal from those computers, can give access to many computers and systems if the man stores the passwords in the computer by using the text documents, and the experienced hacker would find those documents in seconds. This is why the computers should ever leave unattended in some hotel rooms or cloakrooms.
Comments
Post a Comment