• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 591
  • Last Modified:

my ex/stalker says he pinged my laptop and is getting info how can I protect myself?

how can I protect my computer from others (exes) who pinged  it and are getting my information? can they also tell what emails have been sent since he pinged my laptop?
0
exmarinegirl
Asked:
exmarinegirl
  • 7
  • 5
  • 3
  • +1
1 Solution
 
matthewrhoadesCommented:
Pinging your laptop is the process of sending one packet (Which is the alphabet backwards and forwards, incidentally) to your IP address and looking for a result.  All he gets is a response that says your IP address has a device receiving and transmitting data.

The question is how are you connected to the internet?  If you are behind a router or firewall the chances of him getting anything are small (HE sounds like a jerk who is just messing with you, incidentally).  If you are connected directly to the internet, you want to turn Windows Firewall on at least, which will probably limit access to your machine as much as you need.

Good points though:

1. Practice good password security, at least eight character, six letters and two numbers, better with symbols.  p455w@rd for example
2.  Use a router or firewall wherever possible, avoid writing your password on a post it note and sticking it to your monitor.

Are you connected directly to the internet?  (Directly to a cable modem or DSL modem) or are you on a network?
0
 
fishadminCommented:
matthewrhoades made some good points.

You can see for yourself what a ping does by going to Start > Run > and type CMD and press enter.

Once the command prompt comes up type:
ping www.google.com

You'll see exactly what a ping does, and that should prove to you that he's blowing smoke.
0
 
exmarinegirlAuthor Commented:
Does that make him capable of knowing(maybe with added software) who my messgs are being sent to and if they're from my computer?
0
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

 
fishadminCommented:
What do you use for email?
0
 
matthewrhoadesCommented:
It depends on how the data is being transmitted from your computer.  If you are using an unsecured unencrypted wireless network or a generally unencrypted network your information and be intercepted with a packet sniffer or a number of other utilities.

The question is one of whether or not your ex has such abilities.  Not likely.
0
 
fishadminCommented:
Well it also depends on whether the emails are being sent encrypted via https gmail for example.  If so even grabbing the packets would be useless.  But you are probably right.  This is probably a little over the abilities of this individual.
0
 
matthewrhoadesCommented:
Could be, but you raise a good point to.  The key is to never underestimate the power of a motivated stalker.  Just when you think he is reading your emails he is busy in your closet stealing your socks.

The bottom line is to avoid mediums of communication that can be monitored if you suspect that your security is compromised.  
0
 
chrisdunn_6Commented:
just change the password on your user accounts and there is no access period.
0
 
chrisdunn_6Commented:
for the average joe I mean
0
 
fishadminCommented:
Ok let me see if I can explain how this works:

1. If you do not have a wireless connection you are fine.  A person would have to get connected in between you and your provider to grab any data.  If that was the case, stalking charges would be the least of this guy's worries if he got caught.

2. With a wireless connection the person would have to do the following:  
  a. Connect to your wireless network, requiring them to be in range of your router.
  b. Intercept the traffic
  c. Decrypt any encryped information

The big thing is 2a.  The guy would have to be close to grab info before it hits your modem and fires off to the internet.  

But that's just for a man in the middle attack.  The easiest way is to simply login as you and grab the emails up that way.  Reset your password (just in case) and change your password reset questions in case he knows those answers.  Like "What high school did you attend?"  After that you should be fine.
0
 
fishadminCommented:
And hide the socks.
0
 
fishadminCommented:
More info!

Ok so when you send an email it goes from point A to point D.  However it passes through a few other places on it's way there.  We'll call them points B and C.  For a person to grab that email while it's being sent they have to fool your computer into sending it to their computer and not points B or C.  For them to do that they would need to jump in line the way I described above.  

If they are at their home, or anywhere more than 100 feet or so from your house this is virtually impossible, even for experienced hackers.

If the email is not being sent and is simply being stored on a server, like your gmail, the person would need to hack into google's servers to get that info.  Also fairly difficult.
0
 
chrisdunn_6Commented:
If your using email such as yahoo or gmail there is no way unless he has those passwords. The trans mission is encrypted eventhough your wireless may be encrypted.
0
 
chrisdunn_6Commented:
If your using email such as yahoo or gmail there is no way unless he has those passwords. The trans mission is encrypted eventhough your wireless may be ((unencrypted.))
0
 
exmarinegirlAuthor Commented:
He is quite computer savvy- so that is my concern- the major one being that he may have had access previously and installed keystroke reading software. i have changed all passcodes. is there a way for me to find if this software was installed and active on my laptop?
0
 
fishadminCommented:
Most antivirus software should pick up nearly all keyloggers.  I would download and run Spybot just in case as well, it picks up a ton of them.
0
 
chrisdunn_6Commented:
I know an answer has already been excepted but if you turn on your firewall you cant be pinged.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

  • 7
  • 5
  • 3
  • +1
Tackle projects and never again get stuck behind a technical roadblock.
Join Now