Solved

Im Portection

Posted on 2006-10-26
6
238 Views
Last Modified: 2010-04-11
I have win xp sp2, NIS2006 everything is completely up to date .  I use yahoo messenger, yahoo mail and I visit yahoo game rooms.  

Today I was on Instant Messenger with someone I considered a friend and I was discussing how a certain person was able to know I was online even when I am invisible.  He told me that its possible to by running a special program to tell if someone has a webcam, what they are saying on IM what they are typing to whom and what " games " room they are in even when you have them blocked or are invisible.  

I noticed a few hours before chatting with this " friend " that someone had im'd me and was asking me if I had a cam , I said no, ( I have one but don't use it ) was meant only for family out of state but have yet to use it.  Anyway, this person kept insisting that I have a cam.  I think its the same person I have on my list as a friend.  

What I want to know is since I have a firewall and everything is up to date,  I've even used black vipers suggestions to shut down unnecessary programs, I also use Mark Janssons suggestions for securing xp  ( www.markusjansson.net)  

In it he helps you shut down the ms shares and such.. How can this person on yahoo messenger know that I have a cam, or know who I am talking to and such. More importantly how can I stop them ?
0
Comment
Question by:Smcf4
  • 2
  • 2
6 Comments
 
LVL 5

Expert Comment

by:darrenakin
ID: 17824510
It is possible to know what hardware a user is running. BUT!!!! It is very difficult. If you are concerned with this you need to run Ad-Aware and Spybot, also Ewido and look for Spyware on your system. Spyware can transfer info to Whoever planted the spyware. This info can range from personal data to your hardware, even your browsing habbits. NIS2006 is a great program for Viruses as well as malware. Note that spyware is different from malware and NIS is not really coded to find it, it is more targeted for malware and virus activity. Unfortunatley all of your information that may be compromised in leaving your computer the same way that the internet comes in, and that is port 80. Your firewall cannot block port 80 or you will have no internet. Run a thourough scan with all of these tools. If you are still worried about this, then list all of your services that are running in the background here and I will be happy to take a look at them for you. Also know that there are programs that run silent or better known as stealth, usually someone would need access to your system to install these types of programs. They cannot be found in add remove programs, nor can they be found through the processes that are running on the machine. They are usually controlled by hot keys sucj as <shift> <s> or <shift> <f>, those are common. So in short there are a ton of variables, but to answer your question, it is possible.
0
 

Author Comment

by:Smcf4
ID: 17921870
If I place a keylogger on my own system ( I have two children who use the internet) I like to be aware of what they are doing, will this make it easier for someone to hack my system? or if not (hack) break into my system?  

I've noticed some strange things happening lately, most dealing with yahoo messenger.  This one person keeps inviting me, as soon as I get the invite, I decline it.  Next thing I know whatever I am typing to someone in an IM is being said In a Yahoo game room In what is called the lobby.  I can't figure out how they are doing this . If I have a person on invisible or " stealth mode"  again they can see everything about my status.  

I realise some of you are probably saying why bother you about this.  Well Yahoo messenger is  a program I have on my computer, my daughter uses it alot to keep in touch with her class mates, I use it to keep in touch with out of state family members. If a person is able to know what I am doing in yahoo messenger are they also able to get into other programs on my system?  Does this mean the whole security of my computer is breeched?  I use my computer to pay bills online and contact business.  If my system is breeched I need to know it .

I have Zone alarm security suite 6.0  firewall / antivirus  I am free from adaware and spyware or so it tells me. I do not download unnecessary things or keep irrelevant prgrams on my computer that I have no use for.  

The items on all of my computers are very limited.

But from what I can tell this has all happened or been happening around yahoo messenger.
0
 

Author Comment

by:Smcf4
ID: 17921875
I forgot to tell you that I also have zone alarm security suite 6.0 and NIS2006  when one of them gives me a program with a program I uninstall it and install the other.  Both are excellent programs but still I can't seem to figure out how these people are getting the information they are getting.
0
 
LVL 5

Accepted Solution

by:
darrenakin earned 500 total points
ID: 17927154
Your Question:
If I place a keylogger on my own system ( I have two children who use the internet) I like to be aware of what they are doing, will this make it easier for someone to hack my system? or if not (hack) break into my system?  

Answer: Not if you place and configure the keylogger yourself, that way you can direct it to send the info however you choose, so in short, No. There is no security risk in installing a GOOD NAME BRAND keylogger. Dont buy cheap imitations. This is a great program http://www.spectorsoft.com/ , they offer several and I have used them before.

Your Question:
I've noticed some strange things happening lately, most dealing with yahoo messenger.  This one person keeps inviting me, as soon as I get the invite, I decline it.  Next thing I know whatever I am typing to someone in an IM is being said In a Yahoo game room In what is called the lobby.  I can't figure out how they are doing this . If I have a person on invisible or " stealth mode"  again they can see everything about my status.

Answer: This really sounds like a keylogging program of some sort, it even more sounds like a monitoring software that may be installed on the system. Let me ask you, how old are your children? They may be playing with software that is giving this info to friends.

Your Question:
I realise some of you are probably saying why bother you about this.  Well Yahoo messenger is  a program I have on my computer, my daughter uses it alot to keep in touch with her class mates, I use it to keep in touch with out of state family members. If a person is able to know what I am doing in yahoo messenger are they also able to get into other programs on my system?  Does this mean the whole security of my computer is breeched?  I use my computer to pay bills online and contact business.  If my system is breeched I need to know it .

Answer: In short, it is very possible that your security is breeched on your system, everything that you have told me raises concerns. It would be best if you took your computer to professionals and have it gone through with a fine tooth comb. The other option that you have is to list all of your services here and let me take a look at them. Here is a problem with that though. Most decent monitoring programs like Spectrasoft, run stealth. This means that there will be no services listed and nothing in add remove programs. They generally have hot keys for the person that placed them there. The other option (Cheaper), is to Backup all data and reformat and reinstall.

You wrote: I have Zone alarm security suite 6.0  firewall / antivirus  I am free from adaware and spyware or so it tells me. I do not download unnecessary things or keep irrelevant prgrams on my computer that I have no use for.

Response: These are good progrmas to have, Open them and go through the config of what programs that it is allowing through, do some research on the ones that you dont know what they are, you may find something here. Unfortunatley your info is problem being sent via port 80, this is basic internet. If you block it, you block your internet.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now