Firewalls are important tools that help to keep off attacks. It ensures that malicious attacks are not allowed to the network. It keeps the internal connection safe. The two security tools can coexist. This is because an IDS just detects malicious activity in the network while a firewall blocks any unauthorized connections. They work autonomously and they can work at the same time and at the same network (Dhillon, 2007).
One way that Linux can be hacked is running top in batch mode. Top is a tool used to monitor Linux system. This is started in command line. After this, one is able to get very reliable and useful information in the system.
Hacks in Windows systems are possible through using an anti-virus. Unlike the convectional way where a virus is hidden in window system folders with the notion one cannot find access them, this proves unreliable since they can be still be accessed by anti-virus as well as malware detection programs. One of the way to ensures that an anti-virus goes unnoticed by a security administrator is through binding a virus file to a legitimate file such as a music, movie or even as document file. In order achieve this you will probably need a binder program that will join the two files into one. To begin of first make sure you have your executable anti-virus in place by this assuming it is has a (.exe) extension. After this select a legitimate file for instance an image file that you will use to bind with your virus. Once you have set up your virus code to execute through your preferred compiler and given it a suitable label for example myhit.exe. You can make your antivirus do whatever you please. But keeping in mind our aim is to make it undetectable we can then use an image file as its icon. Unless an intelligent anti-virus is deployed by the security anti-virus to detect the virus signature, one can often neglect (Dhillon, 2007).
CrnkovicÌ, D. (2011). Information security, coding theory and related combinatorics information coding and combinatorics. Amsterdam: IOS Press.
Dhillon, G. (2007). Principles of information systems security: text and cases. Hoboken, NJ: John Wiley & Sons.