Solved

Unwanted visitor on Windows 2000 professional

Posted on 2004-04-10
4
419 Views
Last Modified: 2013-12-04
Hi:
     I need help to get rid of an unwanted visitor on my Windows 2000 professional computer.
The visitor appears connected to my home network and can be seen under network neighbourhood as server Andreat-10113.

Can someone help me?
0
Comment
Question by:LearningJava
  • 4
4 Comments
 
LVL 12

Accepted Solution

by:
trywaredk earned 500 total points
Comment Utility
Cleaning your computer  - and protecting it in the future -  can't be answered with one issue.

As you can see in my url below there are at least 7 different issues, where you should decide 1 of each, or else you does'nt protect your computer at all.

The reason is, that the many different programs not always protects against each other, and each of them does'nt protect equally.

It's very important, that you study all of these issues in my knowledgebase (some of them are freeware):
http://www.tryware.dk/English/Knowledgebase/HowToProtectYourComputer.html

BTW: I'm using the Trend Micro virus-suite, and SoftScan , and haven't got any of my servers or computers infected since 1999.

Many Regards
Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open
0
 
LVL 12

Expert Comment

by:trywaredk
Comment Utility
ControlPAnel
Administration
Computermanagement

Choose System - shared folders - sessions

If any - rightclick and get rid of it.

0
 
LVL 12

Expert Comment

by:trywaredk
Comment Utility
Maybe it's an old hacker, not shown in sessions.

What you see in network neighbourhood is history and/or actual "sessions"

If it's history - follow my 7 issues, cleanup your computer, and protect it in the future
0
 
LVL 12

Expert Comment

by:trywaredk
Comment Utility
:o) Glad I could help you - thank you for the points
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now