Are Cable Internet Connections Vulnerable to Hackers?
A PC that is connected to the Internet via a cable modem is always vulnerable to a malicious hack attack whenever the PC is on.
A PC that is connected to the Internet via a cable modem (i.e., using a cable television ISP) is always vulnerable to a malicious hack attack whenever the PC is on. Even if a browser is not opened, merely turning on a PC with a cable connection renders the device vulnerable to attack.
Why is this? Because cable ISPs, in providing the Internet access to a user, essentially are creating giant always-connected networks of PCs comprised of all their customers. Cable connections utilize Ethernet cards, which render the user one link in a giant network. Even if a browser is never opened, a cable-connected PC links to the Ethernet-enabled network (i.e., the Internet) as soon as the PC is booted -- just as a connection to a LAN or other corporate network renders the device vulnerable to attacks across that network. This gives a hacker access to the user's hard drive, and opens the door for many kinds of malicious hack attacks.
One way to protect a cable-connected PC from malicious hacks is to disable file-sharing and print-sharing capabilities in the operating system. This is a simple solution for some but for others not a reality as this method basically disables any kind of home networking.
A better method is to install either a hardware or software firewall. A hardware firewall typically is a small device that the cable and the Ethernet card are both connected to. All transmissions pass through the hardware firewall. A software firewall, which is the more common and cheaper of the two methods, is a piece of code that resides on your PC and is always running. The software watches interactions between the PC and the Internet and blocks any suspicious activities.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
From keyword analysis to backlinks and Google search engine algorithm updates, our search engine optimization glossary lists 85 SEO terms you need... Read More »Slideshow: History of Microsoft Operating Systems
Microsoft Windows is a family of operating systems for personal computers. In this article we look at the history of Microsoft operating... Read More »Slideshow: Interesting Facts About Google Search
From Goats to Penguins, a server outage and trillions of searches, our slideshow presents interesting facts about Google and the Google.com... Read More »
Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »Java Basics, Part 2
This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »The 7 Layers of the OSI Model
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »