Solved

Hack Proofing Computer

Posted on 1998-09-22
9
172 Views
Last Modified: 2010-04-27
Is there any software that can help prevent hackers from getting into my system? Or software that can show me who is connected to my computer?
0
Comment
Question by:GreatOne
  • 3
  • 3
  • 2
  • +1
9 Comments
 
LVL 1

Accepted Solution

by:
willemnel earned 20 total points
ID: 1010751
Yes, lots! Try a search on one of the big search engines (Yahoo, Excite etc.) with words like "firewall" and "network security".  You must, of course, make sure that you get the right product for your type of platform/network configuration. I'm not sure if there are any shareware security programs, but I wouldn't reccomend this anyway, since their quality may be suspect.
0
 

Expert Comment

by:Penfold
ID: 1010752
What type of System are we talking about here. Is this just a home PC with a connection to the Net, and what OS is it using ?
0
 

Author Comment

by:GreatOne
ID: 1010753
It's a home system connected to the Net. I am running Win98
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 1

Expert Comment

by:nbdyfool
ID: 1010754
Do you have information that is that vital?  Is there any reason why a hacker would seek you out?  As long as you are careful about giving out your personal info over the Net, you shouldn't have anything to worry about.  Also, it's a good idea to not put your real name into the system as the owner or registered-to name for the software...and choose a login name that is not related to your own name for your ISP...they usually will let you choose whatever you want (within reason).  Same with your e-mail address...If you want to keep a record of what names you use in registration, write them down and put them in a safe place for reference.  There are also programs you can get to protect your system when you talk on IRC, to prevent attacks from other users.  Chances are, you'll never have this kind of problem, despite what the news media says...use common sense, take reasonable precautions, and don't worry about it, unless you work for the Pentagon from your home...  :o)
0
 

Author Comment

by:GreatOne
ID: 1010755
nbdyfool,
The reason I asked the question is becasue my computer was hacked into just recently. And not just once but THREE times. I have no idea why me. But they were able to do it without me knowing and that freaked me out.
0
 
LVL 1

Expert Comment

by:nbdyfool
ID: 1010756
Did they do it while you were on the system, or when you weren't around?  I wasn't trying to make light of the situation, but you didn't indicate that it had already happened.  A little more detail about when and how might help to suggest some steps that you could take to minimize your exposure.  I'm sorry someone has decided that your computer would be fun to mess around with, and I hope they get caught.
0
 

Author Comment

by:GreatOne
ID: 1010757
Ok...Here's what happened. I was connect to ICQ like always. Then I noticed my hard drive just started spinning for no reason. All of a sudden, I get a window on my screen that says something like "Hahah I got in". So I immediately disconnected.  Luckily they didnt do any real damage. they just created empty folders. but the fact they could have done some damage, got to me. any ideas on what i can do to avoid this?
0
 
LVL 1

Expert Comment

by:nbdyfool
ID: 1010758
How did you have ICQ set?  You might think about closing that ICQ name, and setting up another, then be very careful who you give it out to.  Use the security settings in ICQ to require your authorization before someone can add you to their list.  I also run a program called NukeNabber that monitors unusual incoming activity.  I'm sure there are more security-type programs out there that will help guard your system, but a lot depends on you to take advantage of any security settings that programs have.  
0
 
LVL 1

Expert Comment

by:willemnel
ID: 1010759
GreatOne, if you want to re-open the question to get more comments/answers, please feel free to reject my answer. You can also try the following: http://www.cgii.co.kr/FAQ.htm  There might be some information here that can help you
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used.

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question