Solved

Have I been hacked?

Posted on 2003-10-21
9
378 Views
Last Modified: 2010-04-11
Have I been hacked, and if so, how do I fix it.  When I log onto microsoft messenger, it tells me that I'm already logged on at another location, which I'm not.  When I check my AOL instant messenger, it has a name that I didn't put there (but it is the name of a relative that doesn't have AOL, and I didn't put him there.  When I am in Yahoo IM, and the regular AOL E-mail, the computer scrolls up and down like someone is controlling it almost through a remote connection.  My guess is that they can read what is written when I am using it. Is there a way to see if I've been hacked and what do I do about it.  How can I protect myself in the future?  Any help would be appreciated.  Thanks.  
0
Comment
Question by:u2caufo
  • 4
  • 3
  • 2
9 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9593308
For windows messenger --

Check to see for sure that you have not logged yourself in another machine elsewhere ..
Uninstall windows messenger from your system
use MSN messenger . Make sure you are logging out each time you close the computer
donot automatically start msn messenger when your computer starts
donot put the password in msn messenger and save the password enabling it to automatically sign in

To prevent hacking in generall have a good firewall . Learn to use the firewall

Have your computer free of virus

Update your machine with the latest security patch

Download spyware removal tools like Spybot and Ad-aware

Download trojan remover and check for trojans

Check to see there is no keylogging software installed in your machine

Donot save passwords on your machine

Sunray
0
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 350 total points
ID: 9593323
0
 
LVL 24

Expert Comment

by:SunBow
ID: 9593872
1) Your description is done so well, like a fairy tale

2) To prevent those who would exploit your vulnerabilities to do all of that, you MUST apply the upgrades and patches when
they are made available, because their very nature is telling the devious of their existence (ability to exploit you)

3) To block those that try to use your ports to their nefarious ends, use a firewall. Common example: ZoneAlarm. Get a blocker like that. Maybe take a look at Sygate.

4) To see if you are too late for a virus, or in your more frequent references, the remote control malwares, a good virus scan with updated patterns such as Symantec's would be in good order.

5) To handle the spywares and adwares etc, you need those products. All are rather incomplete, unfortunately, compared to the A/V product lines. Running SpyBot and adaware is in order for that.  A ZoneAlarm may catch them trying to tell their tales to the devious deployers.

6) Be good. Be wise. Do not be running so many spurious trickster programs offering you free stuff, telling you that you won a contest you never entered, or offer you a nice sounding program you never requested, whether in eMail or in ICQ or on the web.

7) Do not bother yourself with unsolicited eMail such as spam. Be willing to shut down computer before having trouble closin links that won't close.

8) While you probably shouldn't save passwords, caching them on your machine, I have less concern now about that than the others. They have to break through to install their junkware, even a keylogger from someone close to you, that it is better IMO to concentrate more on the keylogger, and to make your ID + password long and both using the greater part of available characters.
0
The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

 

Author Comment

by:u2caufo
ID: 9594785
Please split points, and thanks you all for your answers.
0
 

Author Comment

by:u2caufo
ID: 9595935
Collaboration,
E-mail notification:  unsubscribe

Is this a for me?
0
 
LVL 24

Expert Comment

by:SunBow
ID: 9599052
?
0
 
LVL 24

Expert Comment

by:SunBow
ID: 9599106
Oldlook:
------------------------------------------------------------------

Collaboration
• Split Points  
• Increase Points:  
• Question Bookmark: Add  
• Post a Comment: (Question and Answer tips)

-----------------------------------------------------------------

You are not a newbie. To split points, select "split points".

Newlook:
-----------------------------------------------------------------

   Split Points  
  Increase Points:  
  Question Bookmark: Add  
   Post a Comment: (Question and Answer tips)  

-----------------------------------------------------------------

(this choice list at bottom of thread is only for asker, when viewing open questions)
0
 

Author Comment

by:u2caufo
ID: 9601777
SunBow,

0
 

Author Comment

by:u2caufo
ID: 9601843
SunBow, I was trying to ask if the "collaberation e-mail notification, unsubscribe" was a note to me. I was trying to find out.  Secondly, you should have left your rudeness at home.  I think it's inappropriate for someone in your position.  I may have been a subscriber for a while, but I am very much a newbee.  Now is it OK to tell you that, or should I be referring this to another department?  Let's let it go and assume that we've both had tough days.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

815 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now