The ways of the perpetrators

In order to undertake their objectives, the perpetrators need at first a way to access your PCs and data. In principle, the following ways are open as long as they are neither blocked nor protected:

Note: In this chapter we only deal with the ways via the central Internet connection, via the router.
Note: For hints on the protection of wireless networks, please refer to the respective chapters of this reference manual resp. of the appropriate device documentation.