Defense Operator Training Programs - Defend yourself against Anonymous.
Here is a proven method of deterence to prevent Anonymous from hacking your PC. EVE Onlines Server however is another area that cannot be protected by our sentry programs.
Protecting Your Computer Against Hackers and Viruses.
This system has worked for me for over six years and never once was my E-Machine hacked. Although I did recently lose her because the Motherboard simply gave out to use. To this day none of my computers have been hacked.
I have have gone deep within the hacker world purposely downloading Key Gens and Cracks and other programs to see if hacking code was imprinted in there programs and not once was my system hacked.
I caught a few viruses that each of the programs below caught at one level or another but to this day my system remains hack proof.
Anonymous has been around for along time. Most likely around the time from when the first Internet connection went live.
They have since then watched and maintained lists of the base programming for each type of computer system and how that computer system is able to connect with the Internet.
Basically hackers are simple minded creatures. They can gain access into a computer when single protection systems are used because the associated protection systems are rather easy to determine from the normal operaring system files the software is meant to protect.
By using multiply software to protect your vital PC systems it will take the hacker far longer to determine which pathways are the correct pathways to access without trigger the protection software response system.
Think of it like this. You have a pot of gold in the center of the room. You have one level of protection protecting the pot of gold. When the sentry moves to a side of the pot of gold leaving it unprotected, the pot of gold is between the protector and the hacker, the hacker is able to get in and plant the virus without being detected.
But if you have a three or more layer of protection when one program is monitoring another file area and the hacker tries to hack and plant the virus, oops out of nowhwere comes another sentry not like the first that causes the hacker to have to re-think their attack pattern to adjust to the new sentry. Just when the hacker thinks they have the new sentries path down along comes the third sentry.
By the time the hacker is able to locate each sentries path of operation each sentry will have already moved to a new portion of the OS to run its checks thus creating an almost perfect system of protection.
Only by chance and luck will the hacker get through your Tri-Layer of Protection.
YOu have to remember that hacker's main goal is getting into a system as fast as possible without being detected. The more layers of protection your PC has will cause them to become frustrated at trying to patternize the pathways by which your sentries are patrolling thus causing them to move onto a less protected system.