?
Solved

IP Address Enough Info to Access my Desktop and Printers, etc?

Posted on 2001-06-14
3
Medium Priority
?
215 Views
Last Modified: 2010-04-11
I hear some hot shots talking about how they can hack into a desktop and any connected devices with just an IP address.  

Is this really enough information?

I know to log onto an NT machine (in a workgroup type arrangement), you pretty much have to have a valid login.

What about machines running Me or W9x?

Should I be concerned about having a machine on the internet connected to a cable modem all the time?  People can access my IP address easily enough whenever I access a Gnutella group.

Thanks,
WKHays
0
Comment
Question by:wkhays
3 Comments
 
LVL 11

Expert Comment

by:geoffryn
ID: 6193132
It's not quitethat easy, but it is a problem.  You should consider a personal firewall like BlackIce or Sygate Personal Firewall.
0
 
LVL 12

Accepted Solution

by:
Housenet earned 120 total points
ID: 6193230
wkhays what makes it easy is 2 things..
1. having file & printer sharing installed on a win9x computer.
2. Needing file & printer sharing on win9x & not setting a password on the shares.

-How do you do it on a machine with the conditions met?..Say the IP of the victim is 200.10.10.10..
-Go to start...Run...& type  \\200.10.10.10 & click ok.
0
 
LVL 4

Author Comment

by:wkhays
ID: 6193940
Both comments are helpful... Housenet's was just what I was looking for ... Confirmation that W9x was vulnerable ... Thanks!
0

Featured Post

Improved Protection from Phishing Attacks

WatchGuard DNSWatch reduces malware infections by detecting and blocking malicious DNS requests, improving your ability to protect employees from phishing attacks. Learn more about our newest service included in Total Security Suite today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

The onset of year 2018 has been a usual business for IT teams still struggling to find their way out in terms of strengthening their cloud security.
This is the conclusion of the review and tests for using two or more Password Managers so you don't need to rely on just one. This article describes the results of a lot of testing in different scenario's to reveal which ones best co-exist together.…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

589 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question