Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Monitoring my system for hackers

Posted on 2007-10-08
6
Medium Priority
?
330 Views
Last Modified: 2010-04-11
Hi ,  can you tell me how can i monitor my system   for hackers to see if somebody is getting in
0
Comment
Question by:bobsunndb
  • 4
  • 2
6 Comments
 
LVL 4

Accepted Solution

by:
jimstar earned 1500 total points
ID: 20038527
There are a few points that you can monitor.

I'd suggest installing a firewall product like ZoneAlarm so that you can see if other users are connecting to your computer. This monitors the 'doorway' through which malicious programs can be installed.

Also, you should install an anti-virus program which will monitor for malicious programs already on your computer, or for things that manage to get past your firewall product (mentioned above).

If you do both of those things, you'll be well on your way.
0
 
LVL 4

Expert Comment

by:jimstar
ID: 20038530
Additionally, if you want to view all of the current connections to your computer, you can go to the start menu --> Run --> type "cmd" and click OK, and then type "netstat" and press enter.

This will show you a list of all current connections to your computer. If you see a connnection to an address that is suspicious, you can investigate it further. However, it does require that you are able to distinguish between wanted and unwanted connections - and this may require some research.
0
 
LVL 4

Expert Comment

by:jimstar
ID: 20038538
And finally, if you want to run a quick scan for spyware and viruses on your machine immediately, you can use Microsoft's free online safety scanner at http://onecare.live.com/site/en-us/default.htm, or Symantec's online security check at http://security.symantec.com/sscv6/default.asp?langid=ie&venid=sym.

These perform a once-over, and don't persist on your machine so they won't substitute for an installable scanner (such as a Microsoft OneCare subscription).
0
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

 

Author Comment

by:bobsunndb
ID: 20038571
how can i investigate  suspicious conecctions, i ask just becouse ones when i did that thing with the  netstat i sow an a conecction with personal name and the name of the isp but defenetly i was not conected to anyting like that, i was sure that was not wanted connection
0
 
LVL 4

Expert Comment

by:jimstar
ID: 20038591
The easiest way to learn more about a connection is to determine what program is using that connection on your computer. You can do that by using:

netstat -b

This will print the program name. From there, you can either recognize the program and decide that it's okay, or decide that you have a virus/spyware that needs cleaned. For the latter, you can use one of the virus/spyware scanning websites above.
0
 

Author Comment

by:bobsunndb
ID: 20038600
thanks
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s a season to be thankful, and we’re thankful for users like you who engage on site, solve technology problems, and network with others in the industry. What tech are we most thankful for? Keep reading.
The article explains the process to deploy a Self-Service password reset portal I developed a few years ago. Hopefully, it will prove useful to someone.  Any comments, bug reports etc. are welcome...
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

572 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question