Home arrow HTML arrow Page 5 - Script Kiddies: Vermin Of The Internet?

Script Kiddies: Vermin Of The Internet?

Everyone's heard of hackers, but what are script kiddies? In this article Michael gives us the low down on his own personal experiences with script kiddies, including ways to combat them.

Author Info:
By: Michael Bloch
Rating: 4 stars4 stars4 stars4 stars4 stars / 6
September 01, 2002
  1. · Script Kiddies: Vermin Of The Internet?
  2. · What Exactly Is A Script Kiddie?
  3. · Trojans In Action
  4. · Is Your Kid A Script Kiddie?
  5. · Who Do Script Kiddies Target?
  6. · Conclusion

print this article

Script Kiddies: Vermin Of The Internet? - Who Do Script Kiddies Target?
(Page 5 of 6 )

It isn't just the casual surfer who is affected by Script Kiddies. Web Site owners are often the targets of "vandals", also known as "Web Crackers". Web cracking is a popular Kiddie past time. These individuals derive great pleasure from making changes to your web site without your knowledge. They access authoring rights to your site by "stealing" your password in a variety of ways. It isn't financially, politically or religiously motivated, it's just vandalism.

A real hacker would not carry out this type of foolishness, this is the realm of the gutless, immature Script Kiddie. It's a bit like that mindless graffiti you see sprayed all over our towns and cities.

In the case of the web site owner, it is imperative that you immediately contact your hosting service as the security of your site has been breached (and therefore probably the whole server). The server's logs record all the activity on your site, and Script Kiddies are notorious for leaving "footprints" behind.

Don't just shrug your shoulders and re-publish your site. What has just occurred to you is cyber-terrorism. There are a number of laws currently being introduced worldwide that will punish cyber-terrorists severely. It is unfortunate the offences are termed cyber-terrorism. In the case of the Script Kiddies it should be called cyber-idiocy. It should carry the death penalty, castration or at least they should be sentenced to a life of using a 386DX40 running Windows 95 rev. A! ;0)

Some other points of contact if your site is attacked are:

National Infrastructure Protection Center. The NIPC are a part of the FBI. On its site, there are forms that you can submit to report any incidents. It also contains up to date information on security threats and advice for ecommerce merchants.


For a more detailed listing of U.S points of contact, The Cyber crime site will have what you need:


In most countries, probably the best second point of call after your contacting your hosting service would be the Police.

The Internet community, either surfers, website owners or ecommerce merchants will only stamp out this problem if we actually do something about it. Don't let those valuable firewall logs go to waste. But if you are going to send them, ensure that what you send shows an established pattern of scans originating from the same source - at least 5 entries in a session. Random scans are very hard to track. A topic for another article.
blog comments powered by Disqus

- Does HTML5 Need a Main Element?
- Revisiting the HTML5 vs. Native Debate
- HTML5: Not for Phone Apps?
- HTML5 or Native?
- Job Hunting? Freelancer.com Lists This Quart...
- HTML5 in the News
- Report: HTML5 Mobile Performance Lags
- The Top HTML5 Audio Players
- Top HTML5 Video Tutorials
- HTML5: Reasons to Learn and Use It
- More of the Top Tutorials for HTML5 Forms
- MobileAppWizard Releases HTML5 App Builder
- HTML5 Boilerplate: Working with jQuery and M...
- HTML5 Boilerplate Introduction
- New API Platform for HTML5

Watch our Tech Videos 
Dev Articles Forums 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Weekly Newsletter
Developer Updates  
Free Website Content 
Contact Us 
Site Map 
Privacy Policy 

Developer Shed Affiliates


© 2003-2018 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap
Popular Web Development Topics
All Web Development Tutorials