Solved

How do you know when a hacker is hacking your computer??

Posted on 1998-07-21
2
547 Views
Last Modified: 2013-12-25
I just want to know what are the signs that a hacker is inside your computer while on the net??
And how to stop this from happerning??
0
Comment
Question by:juggernaut
2 Comments
 
LVL 1

Expert Comment

by:Bluemoon
ID: 1858618
a) if stange things happen on your computer, Unusual processen are running, Someone else than yourselfs ROOT is, unusual long handdisk activity, You'll get mail from other computers where you haven't been saying they got hacked by you

b) unplug from the net ?
No, just kidding, You'd have to have some security around your ports, first thing you need to do is activate some logging, and limit the access from outside your computer to you

WHAT OPERATING SYSTEM ARE YOU USING ?????
0
 
LVL 3

Accepted Solution

by:
moonlight earned 0 total points
ID: 1858619
Since this question is in the web authoring area, I guess you mean hackers coming in from your web facility.

a) signs: private files are altered by the WWW user.
b) the most easy way: do not give any access rights for writing to your www user account.

But if you must:
Do not have shell programs in your cgi-bin directory. Do not allow anyone to read your scripts. Try to break in to your own system in order to notice security holes. Check up on the files every now and then..  Use user authentication for files you want to protect. make sure your configuration files are hidden and not readable..
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

Introduction HTML checkboxes provide the perfect way for a web developer to receive client input when the client's options might be none, one or many.  But the PHP code for processing the checkboxes can be confusing at first.  What if a checkbox is…
Uploading files to the web server has become common part of almost any kind of web application. People use different technologies to solve this, but regardless of the technology used, it is always useful to have some kind of progress indicator shown…
This tutorial demonstrates how to identify and create boundary or building outlines in Google Maps. In this example, I outline the boundaries of an enclosed skatepark within a community park.  Login to your Google Account, then  Google for "Google M…
This video teaches users how to migrate an existing Wordpress website to a new domain.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now