Solved

IP Address Enough Info to Access my Desktop and Printers, etc?

Posted on 2001-06-14
3
202 Views
Last Modified: 2010-04-11
I hear some hot shots talking about how they can hack into a desktop and any connected devices with just an IP address.  

Is this really enough information?

I know to log onto an NT machine (in a workgroup type arrangement), you pretty much have to have a valid login.

What about machines running Me or W9x?

Should I be concerned about having a machine on the internet connected to a cable modem all the time?  People can access my IP address easily enough whenever I access a Gnutella group.

Thanks,
WKHays
0
Comment
Question by:wkhays
3 Comments
 
LVL 11

Expert Comment

by:geoffryn
Comment Utility
It's not quitethat easy, but it is a problem.  You should consider a personal firewall like BlackIce or Sygate Personal Firewall.
0
 
LVL 12

Accepted Solution

by:
Housenet earned 30 total points
Comment Utility
wkhays what makes it easy is 2 things..
1. having file & printer sharing installed on a win9x computer.
2. Needing file & printer sharing on win9x & not setting a password on the shares.

-How do you do it on a machine with the conditions met?..Say the IP of the victim is 200.10.10.10..
-Go to start...Run...& type  \\200.10.10.10 & click ok.
0
 
LVL 4

Author Comment

by:wkhays
Comment Utility
Both comments are helpful... Housenet's was just what I was looking for ... Confirmation that W9x was vulnerable ... Thanks!
0

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now