Solved

Hard Drive Access: Need Second Expert's Opinion

Posted on 1997-06-25
5
195 Views
Last Modified: 2010-04-12

I would like to know if hackers/intruders can access my
hard drive/files/information while I'm connected online
(i.e. Netscape connection through AOL server)?
What about when I'm off-line?


I know about "cookies", but I'm not referring to that....I
am talking about unauthorized access by hackers to
information on my hard drive.


If your answer is yes, how is this possible and what can
be done to prevent it? I'm thinking of using a program
called Abuse.Net......would this be effective?


Thank you for answering. :)

Tiffany
0
Comment
Question by:TiffanyL
5 Comments
 
LVL 5

Accepted Solution

by:
n0thing earned 50 total points
ID: 1009905
Hi,

   It's possible to access data on your hard drive if you run
malicious Java scripts or ActiveX apps. Cookies are just a key
to validate yourself on some sites.
    You could disable Java, Javascripts, ActiveX apps under
security options on your browser & you'll be safe.

Regards,
Minh Lai
0
 

Author Comment

by:TiffanyL
ID: 1009906
Hi Minh,

Thanks for your answer.....I disabled Javascript
on my Netscape browswer just to be on the safe side.

0
 

Expert Comment

by:jhutto
ID: 1009907
It might be possable in JAVA, but i haven't heard of a way yet.

ActiveX it's EASY! that's one reason I am NOT using InterNet Explorer. You can do ANYTHING with activeX.. No matter the setting on the software. dispite what Microsoft clams..
0
 

Author Comment

by:TiffanyL
ID: 1009908
Hi jhutto,

Thank you for your answer.......I appreciate it.
I'll make sure I stay with Netscape instead of
using Internet Explorer......I didn't know they
were using ActiveX.   Thanks again.

Tiff
0
 

Expert Comment

by:Azazeel
ID: 1009909
Hi TiffanyL,
     
   It is possible for On-Line services to access and use data off of your hard drive(s).  Prodigy got into trouble a few years ago when the searched hard drives for software updates, AOL updates files constantly (which requires resources.  In chat-rooms, people were able to send DOS commands and make computers do checks on Floppies, hard-drvies, etc...  those same commands are now blocked out, but other services don't check for them.  

  The answers you received were about the best you could get. but there is no real way to stop a good hacker, except to stay offline, and that isn't viable in today's business.

0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is it worth it to buy an Echo? In a word, yes! For me it was definitely worth it. I use mine on a daily basis. Prologue & Privacy At first, I was very skeptical about the Amazon Echo. In general, I don't like voice assistants. I don't li…
Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question