This document belongs to the dataroom of, Anti-Hack Jobs
, of which in turn, belongs to Australian based KangaBytes
as the owner and author of all content within this document.
The Anti-Hack Jobs
advisory, is to advise in respect to, how best to protect the data of your customers, from hacking events.
The use of these tips, requires a license. Please visit the online dataroom at www.kangabytes.tips/pass.html for this information.
This document focuses on other ideas and activities, of which, are the domain of, the likes of moderators, and/or security officials, where they establish systems or features of which have the exclusive purpose of, to detect a hacking event.
None of your regular customers will ever take part in any of these tip activities.
The metaphoric idea is, much like having sheep-dogs, living within the herd of sheep.
As for our literal reality, you have yourself some trip accounts
, registered in with the regular customer accounts.
Because, the only persons of who will ever attempt to gain access to any of these trip accounts
, are in fact, the hackers of who, do not know any better as to which account is real, and which account(s) are fake.
Your trip accounts
(s) shall act as an early warning system, alerting you to the activity of hackers of whom are trying to hack into your system.
There are two types of hackers of which we aim to tackle here.
First is,
The other one is,
Counter Hacker
Is a person, who, targets the hackers, by hacking into the systems of the hackers.
trip account.
trip accountss.
trip account, into a database table of which is specific to the registration of these events, and, to then run a script of which uses that table, to get a count of how many attempts there have been, in recent time.
trip accountss to 'trip'.
None of your customers do anything to create, nor to use any of your Trip Account
s.
This is the person, of who, you hire to create these trip accounts
s, on your behalf.
While, part of this advisory includes the use of, trip accounts
s being created for each nth customer you have joining up, there is still the option of, having your admin staff, create the odd one here and there, manually.
Your staff member, will use a special purpose form page, whos purpose is for manually creating trip accounts
s.
FakeSideword.
Should you have a mate or other contact of who is a Counter Hacker
(A person who attacks/hacks those who do the real hacking), then, you can send to that contact, the IP address of, whoever trys to access these trip accounts
s.
Your application script, should perhaps, create a new trip accounts
each time that, you get the nth customer in a row. This is to ensure that, you will always have a reasonable strike rate ratio.
It is up to your own webmaster to determine how often these automatically extra Trip Account
accounts are created, as well as to how many of Trip Account
accounts are created each time too.
This creates trip accounts
frequencies of which are all over the place, and, as a result makes it impossible for hackers to predict what accounts are going to be a Trip Account
.
Set the system, to trigger an alarm, when there has been a certain quantity of attempts on trip accounts
within a specific period of time.
Should the website be shut down each time that, a Trip Account
is accessed, then, the hacker world is sure to find out really quick as to which accounts are Trip Accounts
, and know which ones they must avoid.
You need to ensure that, the hackers keep using these same Trip Account
, to ensure they continu to be your alarm system for as long as is possible.
When Hackers are phishing around, and only accessing your Trip Account
s, you may say that, the only harm is to whatever fake data you have inside those accounts.
However, once, you detect that one of those hacker IP addresses are trying to access a true account, then, that is time for instant action.
trip accountss, near the time of your establishment.
trip accounts, does in fact, really exist.
trip accountsbeing used by a hacker.
When the hacker has purchased a list of dark data, from the dark web, that hacker is going to purhcase the log in data for at least one of your trip accounts
s too.
Furthermore, as part of our Fake Darkies
advisory, you have the option of, selling your trip accounts
s on the dark web, like they are stolen data of real value to the hacker world.
One option includes, send the hacker, fakeside
information, just like when a hacker has used a FakeSide
word, need I say any more here.
trip accounts.
Once the dark world, has learned of, your Trip Account
s, and, which account numbers are your Trip Account
s, your early warning alarm system SHALL NO LONGER work.
The easiest way for this to happen, is, when the hacker detects that, particular event(s) always happen at the same time after they access a particular account.
Please Note: This list of risks may NOT be complete. You are advised by us, to seek your own, independent advice in respect to this.
As advised elsewhere, it is a better idea to be triggered, at random lengths of time after the access of a Trip Account
, or, wait for a minimum quantity of access attempts within say, a five minute period of time.