Solved

Hard Drive Security

Posted on 1997-06-25
2
221 Views
Last Modified: 2010-04-12
I would like to know if hackers/intruders can access my
hard drive/files/information while I'm connected online (i.e. Netscape connection through AOL server)?  What about
when I'm off-line?

I know about "cookies", but I'm not referring to that....I
am talking about unauthorized access by hackers to information on my hard drive.

If your answer is yes, how is this possible and what can
be done to prevent it?   I'm thinking of using a program
called Abuse.Net......would this be effective?

Thank you for answering. :)

Tiffany
0
Comment
Question by:TiffanyL
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 1

Accepted Solution

by:
alechko earned 100 total points
ID: 1009860
The truth : InterNet Explorer had a "future" that overs could get your password, NetScape don't have it.

While you're off-line you don't have to be voried about nothing , the only way to get information about data that your disk contains is to come to you computer ( phisicaly ) and type "dir"
.
While you're online , I can't see any way people can do something, unless you use Linux or other unix clone OS which
is not secured untill you invest a lot of work in it.

0
 

Author Comment

by:TiffanyL
ID: 1009861
Hello Alechko,

Thank you for your response, but I am not sure about
the last part of your answer in reference to hackers
obtaining information from my hard drive while I'm
online.  From what you told me, it would be very difficult
for a hacker to do that, but I have heard reports of it
happening and since there are programs designed to protect against it; it must be occurring.

I'm going to post this question again, so I can see how
someone else answers it.   Thank you for your answer and,
hopefully, you are correct in that nobody can access my
hard drive while online......but I'll feel better if I get
one more opinion on this subject.

Thanks,
Tiffany
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question