Solved

Hard Drive Security

Posted on 1997-06-25
2
214 Views
Last Modified: 2010-04-12
I would like to know if hackers/intruders can access my
hard drive/files/information while I'm connected online (i.e. Netscape connection through AOL server)?  What about
when I'm off-line?

I know about "cookies", but I'm not referring to that....I
am talking about unauthorized access by hackers to information on my hard drive.

If your answer is yes, how is this possible and what can
be done to prevent it?   I'm thinking of using a program
called Abuse.Net......would this be effective?

Thank you for answering. :)

Tiffany
0
Comment
Question by:TiffanyL
2 Comments
 
LVL 1

Accepted Solution

by:
alechko earned 100 total points
ID: 1009860
The truth : InterNet Explorer had a "future" that overs could get your password, NetScape don't have it.

While you're off-line you don't have to be voried about nothing , the only way to get information about data that your disk contains is to come to you computer ( phisicaly ) and type "dir"
.
While you're online , I can't see any way people can do something, unless you use Linux or other unix clone OS which
is not secured untill you invest a lot of work in it.

0
 

Author Comment

by:TiffanyL
ID: 1009861
Hello Alechko,

Thank you for your response, but I am not sure about
the last part of your answer in reference to hackers
obtaining information from my hard drive while I'm
online.  From what you told me, it would be very difficult
for a hacker to do that, but I have heard reports of it
happening and since there are programs designed to protect against it; it must be occurring.

I'm going to post this question again, so I can see how
someone else answers it.   Thank you for your answer and,
hopefully, you are correct in that nobody can access my
hard drive while online......but I'll feel better if I get
one more opinion on this subject.

Thanks,
Tiffany
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question