[Webinar] Streamline your web hosting managementRegister Today

  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 3931
  • Last Modified:

detect hackers.... at any means

Dear EE..

I am damn piss off with my fren(Hacker)..
he is good in hacking.... and he even tell us that he knows how to crack email passwords but of cos we dunno how he do it..

well.... now he go and crack my another frens yahoo and hotmail password and account... now my fren cannot access to his email account... the Hacker also hack and get our ISP account with password...
Actually I just want to ask.. how that Hacker do that? Does he plan a virus/monitoring tool in my frens computer? As what I heard... both of them are dynamic IP and the IP always change.. but yet the stupid hacker can always detect and monitor my fren when he is online and even change some of my frens computer settings... well this situation getting serious as my fren's dad is a head of police department and the cyberlaw do apply here,...

Now what we need is sufficient prove to DETECT the hacker... but he use dynamic IP as normal dialup..how to detect them? even if detect? we can proof that the location is in his house?
is time to sue him.. for his pissoff action... HELP...
  • 3
  • 3
  • 2
  • +1
1 Solution
Pete LongTechnical ConsultantCommented:
>>Actually I just want to ask.. how that Hacker do that? Does he plan a virus/monitoring tool in my frens computer

For obvious reasons we cannot tell you how to do this!

however a key loginng program on your PC will be able to capture your keystrokes this is no big secret, and getting a Yahoo/Hotmail Password can be done  by a twelve year old - I would suspect your friend is not very technically adept?

First Start Protecting yourself

1. Get Some Firewall Software
The basic version is still free!
Zone Labs offers a complete range of firewall products, from the free ZoneAlarm, to the comprehensive protection of ZoneAlarm Plus, to the ultimate privacy and security tools in ZoneAlarm Pro.

Black Ice Defender
BlackICE teams a personal firewall with an advanced intrusion detection system to constantly watch your Internet connections for suspicious behavior.

Symantec's Norton™ Personal Firewall
Keeps hackers out and personal data in. It makes robust firewall protection easy by automatically hiding your PC on the Internet and blocking suspicious connections. Norton Personal Firewall also protects your privacy by preventing confidential information from being sent out without your knowledge.

McAfee Personal Firewall
Personal Firewall places a barrier between the Internet and your PC, helping to block hackers from accessing your computer and allowing you to digitally 'fingerprint' trusted applications. Every time your computer is probed or attacked, you get detailed reports and clear follow-up options.

2. Get some Decent Spyware Protection

Spyware & Adware

What is Spyware?

Spyware is ANY SOFTWARE which uses a user's Internet connection in the without the user knowledge. Although Software Firms and Web pages that launch this "code" on your PC are required to ask your permission many don’t! ANY SOFTWARE communicating across the Internet from Your PC without your knowledge is guilty of information theft and is rightfully termed: Spyware.

What is Adware?

Adware is basically any application in which advertising banners are displayed while the program is running. This is built in to the coding of the Software that delivers the Adds to your desktop, these adds are either displayed as pop up windows or through a Banner on the software front end. Many people believe that the revenue earned from this is justification for recouping development costs, which then doesn’t need to be passed to the user.

Adware, Spyware and other unwanted "malware" - and how to remove them

*****Removal Tools (Freeware) *****

Ad Aware http://www.lavasoftusa.com/software/adaware/
Spy Bot http://security.kolla.de/news.php?lang=en
Trojan Remover :http://www.simplysup.com/
HijackThis http://www.spychecker.com/program/hijackthis.html
Spyware Blaster http://www.javacoolsoftware.com/spywareblaster.html
X Cleaner Free http://www.xblock.com/download-freeware.shtml
*****Removal Tools (Shareware & Trialware)*****

Goodbye Spy http://www.topshareware.com/GoodBye-Spy-download-2012.htm
Spy Cop http://spycop.com/products.htm

**********Prevent Browser Hijacking**********
BHODemon (Freeware)
Think of BHODemon as a guardian for your Internet browser: it protects you from unknown Browser Helper Objects (BHOs), by letting you enable/disable them individually. This program is my choice for BHO detection and is highly recommended.
Browser Hijack Blaster http://www.wilderssecurity.net/bhblaster.html

3. Then Get Some AV software AND KEEP IT UPDATED

Virus Checking

If you cant get the PC to boot you will need to scan from Dos

Online (Free) Virus Checking can be done at

SYMANTEC (You must have ActiveX enabled on your browser for it to work!)

Trend Micro (Housecall)

But You really Need some good quality Anti Virus Installed!


AntiDote Lite http://www.vintage-solutions.com/English/Antivirus/Super/index.html
Avast http://www.avast.com/
F-Prot http://www.f-prot.com/products/
V-Catch http://www.vcatch.com/download.html

The BIG Boys in AV


Symantec (or the firm formally known as Norton)

Sophos (This Protects My Corporate Network)


4. If you dont use personal passwords on your PC - Get in the habit of doing so, get yourself an EMail account with a webmail provider, other than Yahoo,Hotmail Altavista etc,

5. Punch your Friend  (hard) in the face

joely2kAuthor Commented:
Thanks  you sooo much for the long response..... I appreciated it.... but the main thing is we want to detect his location/IP of the hacker.? possible? marks and credits is surely for you... if I have more points I dun mind allocated :(
If you use the ZoneAlarm program PeteLong mentioned, you can monitor all incoming and outgoing connections - IP address, port, etc.  You could also run "netstat -a" or "netstat -an" from a DOS prompt (Start Menu -> Run -> cmd).

If this is as serious as you say it is, and if your friend's dad is with the police, he might be able to go to the ISP (assuming your hacker "friend" is using the same ISP) and see if they can tell you that your hacker friend's account was using that IP address at that time.
The eGuide to Automating Firewall Change Control

Today’s IT environment is constantly changing, which affects security policies and firewall rules. Discover tips to help you embrace this change through process improvement & identify areas where automation & actionable intelligence can enhance both security and business agility.

Pete LongTechnical ConsultantCommented:
john is correct

YOur Primary Aim is to get the attackers IP address - which will get you the offenders ISP (as John Pointed out)

Heres a cool tool to impress your friends with when you have the IP
VisualRoute® Personal Edition

Or do it manually :)

Tracing IP addresses and Domain Names


Europe - Ripe (Whois) Database - IP Search

The RIPE Network Management Database (the RIPE Database) contains information about

Allocations and assignments of IP address space
Internet routing
Reverse DNS
Related objects.

The data is put into the database by those who operate IP networks
within the RIPE region. The RIPE NCC supports the operation of the
RIPE Database, but it is not responsible for its contents.

The data is accessible by a whois service (whois.ripe.net).  Thus, the RIPE
Database is sometimes called the RIPE Whois Database.

*****Americas, Caribique and Africa*****

ARIN Whois

ARIN's WHOIS service provides a mechanism for finding contact and registration information for resources registered with ARIN. ARIN's database contains IP addresses, autonomous system (AS) numbers, organizations or customers that are associated with these resources, and related Points of Contact (POC).

*****Aisia & Pacific Regeon*****

APNIC Whois  

APNIC is one of four Regional Internet Registries currently operating in the world. It provides allocation and registration services which support the operation of the Internet globally. It is a not-for-profit, membership-based organisation whose members include Internet Service Providers, National Internet Registries, and similar organisations. APNIC represents the Asia Pacific region, comprising 62 economies

*****Domain Name Tracing*****

NSI Whois Domain-names



Pete LongTechnical ConsultantCommented:
I know that it is quite a while since the question was posted, but if you get the free trial version of ZoneAlarm Pro, you can use the Hacker Info tab of the alert help thing.  They try to pinpoint where in the world a "hacker" is.  You have to set it to display all high priority alerts ("that are probably hacker activity").  (http://www.zonealarm.com) [redirects to ZoneLabs]
Also, AVG antivirus is free (http://www.grisoft.com).  

Oh. And one more thing, if you go to GRC.COM, there are some reviews of different firewalls etc., and they say that BlackICE is not very good.  


* I cannot be held responsible for the opinions of GRC.COM or their affiliates, and do not hold any judgement regarding the performance of BlackICE defender or any related products.  
* I have never used BlackICE defender.  
* All I know is that ZoneAlarm does the job and is free.  Also, AVG has detected viruses on my PC and is also free.  
* There might be other products available that do the jobs better and suit your needs.  
Sorry, yet another post from me.  
I know it does not sound very professional from its name, but GeekSuperhero (http://www.geeksuperhero.com) is a good program that stops downloaded programs, viruses etc, from modifying your programs settings.  

You'll need to ask your own question.  See here: http:help.jsp#hs3

In addition, a Mod will be by soon to remove your email address(es) and phone number for your privacy.

I'm not too familiar with Hotmail, but have you tried sending a message to abuse@hotmail.com ?

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

  • 3
  • 3
  • 2
  • +1
Tackle projects and never again get stuck behind a technical roadblock.
Join Now