Solved

IP Address Enough Info to Access my Desktop and Printers, etc?

Posted on 2001-06-14
3
209 Views
Last Modified: 2010-04-11
I hear some hot shots talking about how they can hack into a desktop and any connected devices with just an IP address.  

Is this really enough information?

I know to log onto an NT machine (in a workgroup type arrangement), you pretty much have to have a valid login.

What about machines running Me or W9x?

Should I be concerned about having a machine on the internet connected to a cable modem all the time?  People can access my IP address easily enough whenever I access a Gnutella group.

Thanks,
WKHays
0
Comment
Question by:wkhays
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 11

Expert Comment

by:geoffryn
ID: 6193132
It's not quitethat easy, but it is a problem.  You should consider a personal firewall like BlackIce or Sygate Personal Firewall.
0
 
LVL 12

Accepted Solution

by:
Housenet earned 30 total points
ID: 6193230
wkhays what makes it easy is 2 things..
1. having file & printer sharing installed on a win9x computer.
2. Needing file & printer sharing on win9x & not setting a password on the shares.

-How do you do it on a machine with the conditions met?..Say the IP of the victim is 200.10.10.10..
-Go to start...Run...& type  \\200.10.10.10 & click ok.
0
 
LVL 4

Author Comment

by:wkhays
ID: 6193940
Both comments are helpful... Housenet's was just what I was looking for ... Confirmation that W9x was vulnerable ... Thanks!
0

Featured Post

Why You Need a DevOps Toolchain

IT needs to deliver services with more agility and velocity. IT must roll out application features and innovations faster to keep up with customer demands, which is where a DevOps toolchain steps in. View the infographic to see why you need a DevOps toolchain.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A hard and fast method for reducing Active Directory Administrators members.
When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and pr…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Suggested Courses

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question