Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


how to tell if someone has hacked into your system

Posted on 2010-01-11
Medium Priority
Last Modified: 2013-12-06
i have a computer with several pings to daily from all over the world.
how can i tell if they have got into the system?

Question by:webdott

Author Comment

ID: 26285244
this is one of the pings:
Event Type: Information
Event Source: WinVNC4
Event Category: None
Event ID: 1
Date:  1/4/2010
Time:  5:10:52 PM
User:  N/A
Computer: MAIN
The description for Event ID ( 1 ) in Source ( WinVNC4 ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. You may be able to use the /AUXSOURCE= flag to retrieve this description; see Help and Support for details. The following information is part of the event: Connections, accepted:
it says the connection was accepted?
does this mean they got it?

LVL 17

Expert Comment

ID: 26290571
This error mean nothing
there are many scans out there but it doesn't mean they got in
do you have a firewall or any other security deices and logs?
LVL 21

Accepted Solution

snusgubben earned 1000 total points
ID: 26290914
Configuration Guide and Best Practices

Read the guide to learn how to orchestrate Data ONTAP, create application-consistent backups and enable fast recovery from NetApp storage snapshots. Version 9.5 also contains performance and scalability enhancements to meet the needs of the largest enterprise environments.


Assisted Solution

hmtwins earned 1000 total points
ID: 26297003
Check  Snusgubben suggestion.

A couple of things to find out is you are hacked.

1. check you outgoing connections (netstat -ab) this will show you your connections and what application is running on that connection. If you see any application you don't know investigate it.

2. You can run process explorer to see if any strange application is starting up that you don't know.

3. Update you computer and you application. every application can be used to infect you computer with a keylogger, backdoor etc.

4. Make sure you have a up to dat virus scanner installed

5. If you dont trust is a all. Do the safes thing, make a backup of you files and reinstall you computer (last option)
LVL 21

Expert Comment

ID: 26297847
Just another thought.

Is you computer behind a firewall in a LAN?

Are we talking about a Windows domain?

Leaving VNC open towards the Internet is risky business. There is a VNC v.4.1.1 cracker tool that allowed users to bypass the VNC authentication. So be sure to check your VNC version.

Author Comment

ID: 26310465
yes it is VNC v4.1.1 free edition.
It is behind a sonicwall firewall. no anti-virus or other on this server
operating system: windows server 2003 r2
i have uninstalled the VNC. the errors have haved stopped in eventvwr

Author Closing Comment

ID: 31675591

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

By the time you finish reading this article, you may have already lost all your money because you don't know the simple steps to securing your BitCoin wallet. BitCoin is an incredible invention. It is a decentralized currency system, which is the…
A quick step-by-step overview of installing and configuring Carbonite Server Backup.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question