In order to undertake their objectives, the perpetrators need at first a way to access your PCs and data. In principle, the following ways are open as long as they are neither blocked nor protected:
- Via the central Internet connection, e. g. via routers.
- Via decentral connections to the Internet, e. g. modems of single PCs or mobile phones on notebooks.
- Via wireless networks operating as a supplement to wired networks.
Note: In this chapter we only deal with the ways via the central Internet connection,
via the router.
Note: For hints on the protection of wireless networks, please refer
to the respective chapters of this reference manual resp. of the appropriate
device documentation.