First off a "hacker" is someone who plays with technology for enjoyment but the term has become synonymous with "cracker," a person that performs an illegal act. So ya ask should ya be are worried about crackers? Well I'd say if you use Windows you have a greater chance of being a target. To find out how secure or unsecure you are, perform an internet connection security analysis (of commonly probed ports).

Find your IP by clicking Here!

 

Enter a domain (for example COM or CH which is short Switzerland), and you can get the name of the country for which that domain is associated.
eMail Dossie
Validate and investigate eMail addresses (for example [email protected]).
Finger
If you can pull a Finger, (for example [email protected]) this will tell you various information about that account.
IP Location
IP Address Locator Tool (for example 17.254.3.183), will return a map dynamically generated using the U.S. Census Bureau's TIGER Mapping Service.
IP Lookup
If the domain name has been activated (for example APPLE.COM), it will return a numerical value such as 17.254.3.183.
IP Targeting
Target the IP host in Latitude/Longitude (for example Micro$oft.COM), will return Lat, Lon: (47.675, -122.117), useful if you want to nuke the evil empire.
MAC Address
MAC address Short for Media Access Control address, a hardware address that uniquely identifies each node of a network (for example "apple" or "allied" or "00:A0:40" or " 00:80:C7").
Unix Manuals
Unix Manuals formats and displays the on-line (UNIX) manual pages. If you specify section, man only looks in that section of the manual.
NMAP
NMAP is a utility for port scanning large networks (for example APPLE.COM).
PING
The ping utility sends a packet to the specified host (for example APPLE.COM) and waits for a reply. The host address and round-trip times for each pair of packets are displayed.
Port Number
The Internet Storm Center gathers more than 3,000,000 intrusion detection log entries every day and providing authoritative data on the types of attacks that are being mounted against computer ports (for example 80 or 19).
Reverse DNS
Type in an IP address (for example 17.254.3.183) to find out the DNS or the Domain Name Server.
Traceroute
Traceroute tracks the path taken by packets as they travel from source (the default is the San Diego Super Computer Center) to destination (for example APPLE.COM).
Traffic Rank
The traffic rank (for example APPLE.COM) is based on aggregated historical traffic data from millions of Alexa Toolbar users and is a combined measure of page views and users (reach.)
Uptime
Report a site's (for example APPLE.COM) operating system, web server, and netblock owner together with, if available, a graphical view of the time since last reboot for each of the computers serving the site.
Whois
Whois, can determine whether the domain name you desire is already in use (for example APPLE.COM); in addition you can learn who administers a particular site; and you can view a list of a site's name servers.
IP Whois
Detailed IP and Network Address Locator Tool (for example 17.254.3.183)will return the U.S. Census Bureau's TIGER Mapping Service.
Serials 2000 and serials & keys are clearinghouses of serial numbers for thousands of commercial and shareware programs that allows a user to check out disabled features of demo programs and reinstall software you may have misplaced the keys for like Windows 98, Windows ME, etc. Cyxla has gathered together a nice default password database of all mayor hardware and software manufacturers such as 3com, Celplex,Cajun ,Cisco, Lotus Domino, Shiva, Cisco, Avaya, microsoft, meridian, shiva, siemens.

This info was originally posted on Computer Security Geek Info