[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Hack Proofing Computer

Posted on 1998-09-22
9
Medium Priority
?
176 Views
Last Modified: 2010-04-27
Is there any software that can help prevent hackers from getting into my system? Or software that can show me who is connected to my computer?
0
Comment
Question by:GreatOne
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
  • 2
  • +1
9 Comments
 
LVL 1

Accepted Solution

by:
willemnel earned 40 total points
ID: 1010751
Yes, lots! Try a search on one of the big search engines (Yahoo, Excite etc.) with words like "firewall" and "network security".  You must, of course, make sure that you get the right product for your type of platform/network configuration. I'm not sure if there are any shareware security programs, but I wouldn't reccomend this anyway, since their quality may be suspect.
0
 

Expert Comment

by:Penfold
ID: 1010752
What type of System are we talking about here. Is this just a home PC with a connection to the Net, and what OS is it using ?
0
 

Author Comment

by:GreatOne
ID: 1010753
It's a home system connected to the Net. I am running Win98
0
Learn Veeam advantages over legacy backup

Every day, more and more legacy backup customers switch to Veeam. Technologies designed for the client-server era cannot restore any IT service running in the hybrid cloud within seconds. Learn top Veeam advantages over legacy backup and get Veeam for the price of your renewal

 
LVL 1

Expert Comment

by:nbdyfool
ID: 1010754
Do you have information that is that vital?  Is there any reason why a hacker would seek you out?  As long as you are careful about giving out your personal info over the Net, you shouldn't have anything to worry about.  Also, it's a good idea to not put your real name into the system as the owner or registered-to name for the software...and choose a login name that is not related to your own name for your ISP...they usually will let you choose whatever you want (within reason).  Same with your e-mail address...If you want to keep a record of what names you use in registration, write them down and put them in a safe place for reference.  There are also programs you can get to protect your system when you talk on IRC, to prevent attacks from other users.  Chances are, you'll never have this kind of problem, despite what the news media says...use common sense, take reasonable precautions, and don't worry about it, unless you work for the Pentagon from your home...  :o)
0
 

Author Comment

by:GreatOne
ID: 1010755
nbdyfool,
The reason I asked the question is becasue my computer was hacked into just recently. And not just once but THREE times. I have no idea why me. But they were able to do it without me knowing and that freaked me out.
0
 
LVL 1

Expert Comment

by:nbdyfool
ID: 1010756
Did they do it while you were on the system, or when you weren't around?  I wasn't trying to make light of the situation, but you didn't indicate that it had already happened.  A little more detail about when and how might help to suggest some steps that you could take to minimize your exposure.  I'm sorry someone has decided that your computer would be fun to mess around with, and I hope they get caught.
0
 

Author Comment

by:GreatOne
ID: 1010757
Ok...Here's what happened. I was connect to ICQ like always. Then I noticed my hard drive just started spinning for no reason. All of a sudden, I get a window on my screen that says something like "Hahah I got in". So I immediately disconnected.  Luckily they didnt do any real damage. they just created empty folders. but the fact they could have done some damage, got to me. any ideas on what i can do to avoid this?
0
 
LVL 1

Expert Comment

by:nbdyfool
ID: 1010758
How did you have ICQ set?  You might think about closing that ICQ name, and setting up another, then be very careful who you give it out to.  Use the security settings in ICQ to require your authorization before someone can add you to their list.  I also run a program called NukeNabber that monitors unusual incoming activity.  I'm sure there are more security-type programs out there that will help guard your system, but a lot depends on you to take advantage of any security settings that programs have.  
0
 
LVL 1

Expert Comment

by:willemnel
ID: 1010759
GreatOne, if you want to re-open the question to get more comments/answers, please feel free to reject my answer. You can also try the following: http://www.cgii.co.kr/FAQ.htm  There might be some information here that can help you
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
Backups and Disaster RecoveryIn this post, we’ll look at strategies for backups and disaster recovery.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Please read the paragraph below before following the instructions in the video — there are important caveats in the paragraph that I did not mention in the video. If your PaperPort 12 or PaperPort 14 is failing to start, or crashing, or hanging, …

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question