


They can steal your personal data or delete the programs you have on your computer. No matter where they are, they can copy photos from your computer onto theirs, or delete your tax records. The hacker could be across the street or across the country. And you have no idea that this is going on.

It’s as if they’re sitting in your cozy computer chair, using your computer and seeing all of your data and files on your computer monitor. The hacker takes over.Ĭan you imagine a stranger-or even worse, a thief-sitting in front of your computer, going through your files and doing whatever they want? That’s what happens once a hacker has used Sub7 to take control of your computer. The hacker knows that with a few keystrokes, they can take control of your computer. The port probe then alerts the hacker that, indeed, port 27374 is open for business…or hacking. If port 27374 happens to be running that day, Sub7 will open that port. The nasty Sub7 program, for example, is known to use port 27374, as well as others. The ports accept different types of data from different sources-think of them as different doors in a house, or boating docks in a busy seaside port.

All computers have ports that are open when they’re on the Internet. One of the tools a hacker uses sends out packets of data to probe computers and find out if there are any vulnerable ports available that are ripe for exploitation. That’s one way they can find out whether or not you have the Sub7 program on your computer. Hackers rely on sophisticated hardware and software to help them scan thousands of computers at a time. You might think that a hacker just gets lucky and happens to target a victim who’s in the wrong place at the wrong time, but that’s not the case. But for that to happen, Sub7 needs to get into your computer…and unfortunately, there are a few ways that can happen to you: Sub7 can work its way into your computer through an email, or the program can be “delivered” to you if you use the Internet Relay Chat (IRC) protocol. One way hackers have attacked computers in the past is through a program call “Sub7” (or SubSeven). Of course, they can’t do anything until they get “inside” your computer, but there are plenty of ways they can make that happen. Yes, it may seem that hackers primarily attack large companies, but the truth is that they can also target your computer just as easily. Talk about a bad day: That’s how you’d feel if a hacker managed to gain access to your home computer.
