bobsunndb
asked on
Monitoring my system for hackers
Hi , can you tell me how can i monitor my system for hackers to see if somebody is getting in
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
And finally, if you want to run a quick scan for spyware and viruses on your machine immediately, you can use Microsoft's free online safety scanner at http://onecare.live.com/site/en-us/default.htm, or Symantec's online security check at http://security.symantec.com/sscv6/default.asp?langid=ie&venid=sym.
These perform a once-over, and don't persist on your machine so they won't substitute for an installable scanner (such as a Microsoft OneCare subscription).
These perform a once-over, and don't persist on your machine so they won't substitute for an installable scanner (such as a Microsoft OneCare subscription).
ASKER
how can i investigate suspicious conecctions, i ask just becouse ones when i did that thing with the netstat i sow an a conecction with personal name and the name of the isp but defenetly i was not conected to anyting like that, i was sure that was not wanted connection
The easiest way to learn more about a connection is to determine what program is using that connection on your computer. You can do that by using:
netstat -b
This will print the program name. From there, you can either recognize the program and decide that it's okay, or decide that you have a virus/spyware that needs cleaned. For the latter, you can use one of the virus/spyware scanning websites above.
netstat -b
This will print the program name. From there, you can either recognize the program and decide that it's okay, or decide that you have a virus/spyware that needs cleaned. For the latter, you can use one of the virus/spyware scanning websites above.
ASKER
thanks
This will show you a list of all current connections to your computer. If you see a connnection to an address that is suspicious, you can investigate it further. However, it does require that you are able to distinguish between wanted and unwanted connections - and this may require some research.