• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 388
  • Last Modified:

Have I been hacked?

Have I been hacked, and if so, how do I fix it.  When I log onto microsoft messenger, it tells me that I'm already logged on at another location, which I'm not.  When I check my AOL instant messenger, it has a name that I didn't put there (but it is the name of a relative that doesn't have AOL, and I didn't put him there.  When I am in Yahoo IM, and the regular AOL E-mail, the computer scrolls up and down like someone is controlling it almost through a remote connection.  My guess is that they can read what is written when I am using it. Is there a way to see if I've been hacked and what do I do about it.  How can I protect myself in the future?  Any help would be appreciated.  Thanks.  
0
u2caufo
Asked:
u2caufo
  • 4
  • 3
  • 2
1 Solution
 
sunray_2003Commented:
For windows messenger --

Check to see for sure that you have not logged yourself in another machine elsewhere ..
Uninstall windows messenger from your system
use MSN messenger . Make sure you are logging out each time you close the computer
donot automatically start msn messenger when your computer starts
donot put the password in msn messenger and save the password enabling it to automatically sign in

To prevent hacking in generall have a good firewall . Learn to use the firewall

Have your computer free of virus

Update your machine with the latest security patch

Download spyware removal tools like Spybot and Ad-aware

Download trojan remover and check for trojans

Check to see there is no keylogging software installed in your machine

Donot save passwords on your machine

Sunray
0
 
SunBowCommented:
1) Your description is done so well, like a fairy tale

2) To prevent those who would exploit your vulnerabilities to do all of that, you MUST apply the upgrades and patches when
they are made available, because their very nature is telling the devious of their existence (ability to exploit you)

3) To block those that try to use your ports to their nefarious ends, use a firewall. Common example: ZoneAlarm. Get a blocker like that. Maybe take a look at Sygate.

4) To see if you are too late for a virus, or in your more frequent references, the remote control malwares, a good virus scan with updated patterns such as Symantec's would be in good order.

5) To handle the spywares and adwares etc, you need those products. All are rather incomplete, unfortunately, compared to the A/V product lines. Running SpyBot and adaware is in order for that.  A ZoneAlarm may catch them trying to tell their tales to the devious deployers.

6) Be good. Be wise. Do not be running so many spurious trickster programs offering you free stuff, telling you that you won a contest you never entered, or offer you a nice sounding program you never requested, whether in eMail or in ICQ or on the web.

7) Do not bother yourself with unsolicited eMail such as spam. Be willing to shut down computer before having trouble closin links that won't close.

8) While you probably shouldn't save passwords, caching them on your machine, I have less concern now about that than the others. They have to break through to install their junkware, even a keylogger from someone close to you, that it is better IMO to concentrate more on the keylogger, and to make your ID + password long and both using the greater part of available characters.
0
Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

 
u2caufoAuthor Commented:
Please split points, and thanks you all for your answers.
0
 
u2caufoAuthor Commented:
Collaboration,
E-mail notification:  unsubscribe

Is this a for me?
0
 
SunBowCommented:
?
0
 
SunBowCommented:
Oldlook:
------------------------------------------------------------------

Collaboration
• Split Points  
• Increase Points:  
• Question Bookmark: Add  
• Post a Comment: (Question and Answer tips)

-----------------------------------------------------------------

You are not a newbie. To split points, select "split points".

Newlook:
-----------------------------------------------------------------

   Split Points  
  Increase Points:  
  Question Bookmark: Add  
   Post a Comment: (Question and Answer tips)  

-----------------------------------------------------------------

(this choice list at bottom of thread is only for asker, when viewing open questions)
0
 
u2caufoAuthor Commented:
SunBow,

0
 
u2caufoAuthor Commented:
SunBow, I was trying to ask if the "collaberation e-mail notification, unsubscribe" was a note to me. I was trying to find out.  Secondly, you should have left your rudeness at home.  I think it's inappropriate for someone in your position.  I may have been a subscriber for a while, but I am very much a newbee.  Now is it OK to tell you that, or should I be referring this to another department?  Let's let it go and assume that we've both had tough days.
0

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

  • 4
  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now