You've probably heard the phrase "brute accounts" more than once. But, most likely, you have no idea what this means. To begin with, it is worth saying that these are user accounts in games, social networks, etc., which were obtained illegally, that is, hacked or stolen. Of course, what brutus is, how it works, it is quite difficult to understand, but we will try to do this. But first, let's figure out how not to become the next victim of intruders.
What is brutus, and how to protect yourself from it
So, there is a special software that allows using the method of selecting combinations of numbers and letters to find the correct passwords for existing logins, mails, etc. Of course, there are a number of features in the work of such programs. For example, the longer and harder the password, the longer it will take, everything can go so far that the brute will fail. As for time, much depends on the processing power of the equipment, the Internet connection. So, the process can last from several minutes and drag on to a day or more.

You probably already managed to understand what brutal accounts are. As for protection, then, as noted above, it is desirable to set a password that is difficult to remember yourself. For example, RKGJH4hKn2. It is safe to say that hacking it will be quite problematic. In addition, it must be remembered that, for example, many identical letters do not give any effect, just like numbers. Everything should be confused and mixed up, it is advisable to alternate between uppercase and lowercase letters.
What is the base for brutus
Of course, the program will not work if there is no data. So, if she has nothing to choose passwords from, then she will not do this. Base is a set of passwords and logins. The larger the list, the more likely it is that your account will be hacked. Much depends on what combinations are present in it, that is, the more literate it is composed, the better. It is also worth noting that the database includes not only passwords, but also logins, since brute force, which is translated from English as โbrute force,โ can simultaneously select both.
It is worth noting that the file itself, in which all the records are stored, is quite large. The minimum length of the combination is 3 letters and numbers, the maximum is 8-16, depending on the program and its version. The selection begins with the letter โAโ and ends with the last letter of the English or Russian alphabets. That's essentially all the database information that may be useful to you.
Who needs it and why?
It is difficult to answer this question unequivocally. People for many reasons try to hack accounts. It can be just fun, the desire to read other people's letters, send invalid messages, etc. The thing is that it is illegal. In addition , brutality can be considered the real theft, and this must be answered. It is strongly discouraged to engage in such matters, especially since sometimes it is a waste of time.
Even if an account is hacked, it can be easily and quickly restored. It is especially simple to do this if you provided real data during registration. As for the accounts created in haste, it will be much more difficult to return them back. But, as practice shows, such accounts are not appreciated by hackers. It makes no sense to take away an account or mail from someone who does not have anything useful, and thereโs no need to talk about it again.
Who does brute force?
It will not be superfluous to say that the so-called hackers do this. This is for large-scale hacks. By and large, such people earn their living from this and do it very skillfully. And the scheme works as follows. With the help of a brute, logins and passwords (a certain amount) are selected, and then the whole thing is sold in bulk to customers. That is, hackers themselves practically do not use what they got illegally, but simply sell it. But who is the buyer, you ask?
It could be anyone. The only thing that can be said is that they are engaged in the purchase of a large number of accounts. Further, these accounts are sold to ordinary users, who are then surprised that he returned to his former owner. The same applies to personal data of payment systems (Webmoney, Qiwi). In addition to the fact that it is likely to get a certain amount of funds, such an account can be sold, this is especially true in cases where there are expensive certificates confirming the competence of the owner.
A bit about proxies for brute force
Any self-respecting hacker first of all thinks about how to protect himself. And since what he does is completely illegal, special attention needs to be paid to this. We already know what brutus is, and now I would like to say how the proxy server works. It will allow you to go unnoticed during hacking accounts. In simple words, the IP address remains unknown. This is the main protection of people hacking other people's accounts.
But that is not all. After the account has been hacked, you need to go to it. But even with the correct username and password, sometimes this is not easy. For example, changing the IP address entails sending a security code to mail or phone, such a system is successfully used by Valve, in particular to protect their product called Steam. Of course, it has already become clear what a proxy for brutus is. Therefore, we can log into any account and not cause any suspicion, which makes the crime ideal.
Some helpful suggestions
Do not repeat once again that the password should be long and complex. It is also not recommended to use your account in crowded places or at work, where anyone can use a computer or laptop. Firstly, a special spyware program can be used, which remembers which keys were pressed, as you know, it will not be difficult to calculate the password.
But this is far from everything you need to know. It is advisable not to remember the password in the browser, as it can be intercepted. There are accounts where, upon entering, sms immediately comes with a confirmation code on a mobile phone. Therefore, if she came, and you have nothing to do with it, then change the password, and it is advisable to act as quickly as possible.
What is the difference between brute and checker?
So, let's now figure out what is the difference between these two concepts. So, we have already decided that brute force allows you to select a username and password by simply sorting from a dictionary (database). Let's look at an example of hacking a mail service. For example, we got access, and what to do next? As a rule, information about accounts in social networks, online games, payment systems, etc., is of interest. So, the checker checks the password from the mail that we already have for matches.
In simple words, if it matches, for example, the one installed by Vkontakte, then we will find out right away. We can conclude that this will deprive us of an extra headache. Consequently, the process is more automated and practically does not require our participation. Now you know what brute and checker are, and how these programs work.
Conclusion
Based on the foregoing, we can draw certain conclusions. The account should only be used on a personal computer when access by unauthorized persons is excluded. The same applies to connections to free Wi-Fi, as there is a possibility of interception of the data stream and the subsequent theft of your account. Since you already know what a brute program is , then it will be much easier for you to defend yourself. As they say, whoever is knowledgeable is armed. Remember that how well your account is protected is up to you. If you did everything right, then you do not need to worry again, and it is unlikely that you will need to know what account brutality is, and the nuances of the program.