Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Hack Proofing Computer

Posted on 1998-09-22
9
Medium Priority
?
177 Views
Last Modified: 2010-04-27
Is there any software that can help prevent hackers from getting into my system? Or software that can show me who is connected to my computer?
0
Comment
Question by:GreatOne
  • 3
  • 3
  • 2
  • +1
9 Comments
 
LVL 1

Accepted Solution

by:
willemnel earned 40 total points
ID: 1010751
Yes, lots! Try a search on one of the big search engines (Yahoo, Excite etc.) with words like "firewall" and "network security".  You must, of course, make sure that you get the right product for your type of platform/network configuration. I'm not sure if there are any shareware security programs, but I wouldn't reccomend this anyway, since their quality may be suspect.
0
 

Expert Comment

by:Penfold
ID: 1010752
What type of System are we talking about here. Is this just a home PC with a connection to the Net, and what OS is it using ?
0
 

Author Comment

by:GreatOne
ID: 1010753
It's a home system connected to the Net. I am running Win98
0
Sign your company up to try the MB 660 headset now

Take control and stay focused in noisy open office environments with the MB 660. By reducing background noise, you can revitalize your office and improve concentration.

 
LVL 1

Expert Comment

by:nbdyfool
ID: 1010754
Do you have information that is that vital?  Is there any reason why a hacker would seek you out?  As long as you are careful about giving out your personal info over the Net, you shouldn't have anything to worry about.  Also, it's a good idea to not put your real name into the system as the owner or registered-to name for the software...and choose a login name that is not related to your own name for your ISP...they usually will let you choose whatever you want (within reason).  Same with your e-mail address...If you want to keep a record of what names you use in registration, write them down and put them in a safe place for reference.  There are also programs you can get to protect your system when you talk on IRC, to prevent attacks from other users.  Chances are, you'll never have this kind of problem, despite what the news media says...use common sense, take reasonable precautions, and don't worry about it, unless you work for the Pentagon from your home...  :o)
0
 

Author Comment

by:GreatOne
ID: 1010755
nbdyfool,
The reason I asked the question is becasue my computer was hacked into just recently. And not just once but THREE times. I have no idea why me. But they were able to do it without me knowing and that freaked me out.
0
 
LVL 1

Expert Comment

by:nbdyfool
ID: 1010756
Did they do it while you were on the system, or when you weren't around?  I wasn't trying to make light of the situation, but you didn't indicate that it had already happened.  A little more detail about when and how might help to suggest some steps that you could take to minimize your exposure.  I'm sorry someone has decided that your computer would be fun to mess around with, and I hope they get caught.
0
 

Author Comment

by:GreatOne
ID: 1010757
Ok...Here's what happened. I was connect to ICQ like always. Then I noticed my hard drive just started spinning for no reason. All of a sudden, I get a window on my screen that says something like "Hahah I got in". So I immediately disconnected.  Luckily they didnt do any real damage. they just created empty folders. but the fact they could have done some damage, got to me. any ideas on what i can do to avoid this?
0
 
LVL 1

Expert Comment

by:nbdyfool
ID: 1010758
How did you have ICQ set?  You might think about closing that ICQ name, and setting up another, then be very careful who you give it out to.  Use the security settings in ICQ to require your authorization before someone can add you to their list.  I also run a program called NukeNabber that monitors unusual incoming activity.  I'm sure there are more security-type programs out there that will help guard your system, but a lot depends on you to take advantage of any security settings that programs have.  
0
 
LVL 1

Expert Comment

by:willemnel
ID: 1010759
GreatOne, if you want to re-open the question to get more comments/answers, please feel free to reject my answer. You can also try the following: http://www.cgii.co.kr/FAQ.htm  There might be some information here that can help you
0

Featured Post

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
pc, laptop  monitor connection configurations
Integration Management Part 2
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question