Helping people with computers... one answer at a time.
Read the article that everyone's commenting on.
Fear not, dumb user!
For parent who fear of child chatting with stranger, Child may chat to any stranger, for only one things that a child cannot reveal such information is a link to your place. Feed some fear to your child just how dangerous if involving to give information contact or in meeting can result to happen.
Here's CNN recording to catch predator;
Now for accounts that involve user/password on internet, such as IM, Mail, Myspace or whatsoever.. 1) You forgot to log off when you leave the computer in public such as at library, work, hotel, and other place of computer access to public. 'hacker' will play with your account, they may changed the password to keep the account for some reason, to check inside email and find the new other account you have created from any company that you registered (myspace, youtube, acme).. 'hacker' may as well go on myspace and click to "forgot password" by filling in email address and wait for popup in email browser.. So, created email account that come with 4 years or so, give hacker assuming that this person's account have register many other site..
To check if 'hacker' is nosy around on your network, This work in most LAN area, the outside of gateway(dsl,modem,cable) does possiable sniffing your datas at the endpoint of server or in route, 'hackers' can sniffing datas on the route point to find any interesting datas to use.
To track them down, Type (Ctrl+R) to open the 'Run dialog box' and type 'cmd.exe' and enter to run console program... type 'netstat -ab' to show the ip address and the program running in your system if there's any other program you find is linking from ip.. Those program is what give 'hacker' interest to play with. This program may be a trojan running that you have been exploited in the past..
Start research on google.com to see what does this program is running, just to check if this is a trojan or not..
Another one to check in your traceroute from your computer to a target computer, the target we'll be using is google.com, on the console, you type 'tracert google.com' You will see what is hopping from your computer, it will show something like this,
Your computer --> DSL --> ISP company --> route box --> misc box --> Google Server ....
How to protect your datas,
To talk on line, use 'ssl' to secure your line.
To use file transfer, two things to use, encrypt the file by using this program http://www.truecrypt.org/downloads.php
Or compress it into RAR or ZIP and set the password in it to protect files inside compression file...
To surfing on browser, 2 things to protect, Use httpS on port 443,
On google.com, Type in url 'google.com:443' This will redirect to 'https://google.com'
The second is probably not secure but it protect your identify if you don't want other same 'hacker' on the route to sniff the same datas you sent to from point A to point B... You use Proxy
Fear about your identify, Well, it what you decided to say your name, address to the outside internet is already sitting there and kept as caching on other side of it.. You can't tell that company to get rid of it.. IT ALREADY OUT THERE... In fact, your information is probably already out there since you have not as a user give out already.. You probably went to agency who work for he company is require to fill your information on their computer.. From that computer, they store information to the server database through the line on internet.. So it is already revealing to the network.. If you have the account to the bank, It is already out there on network.. If you use the library card, it is already out there, Your name, address, phone... If you have registering for a yellow book for your house phone number, it is already out on internet..
Point being, Your identify, don't spread more information that may led to "hacker's interest" to take from your... Your name, address, phone number.. What can the 'hacker' use them for? Probably nothing.. maybe spaming your mail.. it is possiable.. http://www.google.com/search?hl=en&sa=X&oi=spell&resnum=0&ct=result&cd=1&q=phone+book&spell=1
'hacker' can get their database of all person's name and address and put in 'hacker program to print' all papers to sent it out..
All of this seem to be pointless to me.. i guess All I could say to you is to start become a hacker and understand exactly what can hacker do. To be awareness of hacker's tools can save you some idea just exactly what they use against to..
Protect your box, Use Firewall/IDS/Proxy/Monitor/Sandbox
Google it if you find such term you're clueless
I have changed my password every two weeks and I still have a hacker getting into my computer and I know who it is and I can't do nothing about it, so Leo can you please tell me what I can do about these people please?
Data traveling on a network such as the internet can be seen by many other machines. Local machines, connected via a hub, for example, all see the data being sent to and from all the other machines connected to the same hub. As the data travels the internet, it's quite possible that other machines on the network can also see the data.
someone please answer my question. if i enter a chat room, can the administrator hack into my computer??
i need to know. i broke one of the rules of the chat room and have been banned from the website...but i am anxious that the administrator may hack into my comp because i know he has hacked into the email accounts of some ppl there... please help me..
I notice you say use SSL but I find for instance when I use yahoo, hotmail and even Gmail only the sign in page is secure, when I navigate away from this page, I see that my information is no longer secure, so I was wondering is it safer if I use Outlook express that I see has an option to encrypt messages I am sending, and is the message going to be encrypted all the way until it reaches the sender?
-----BEGIN PGP SIGNED MESSAGE-----
Actually GMail stays in secure mode if you go to it in secure mode.
Encrypting a message is different, and requires that your recipient have the
ability to decrypt it.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (MingW32)
-----END PGP SIGNATURE-----
can someone hack my computer and then send emails with IP address of my computer? In other words, can someone use my IP address from a distant computer after hacking my system?
That's exactly what bots do - send email from your machine. Basically if your
machine is infected or hacked, all bets are off - they can do anything.
-----END PGP SIGNATURE-----
I have been talking to who I thought was a friend for the past 2 months and then he popped up and said that he wasnt really that person. He was just using his screen name and myspace. But this guy has been sending me my friends pics and information about his work in the military. Is that possible to really be able to have acess to someones whole computer like that?
Absolutely. If your (real) friend was careless and somehow
let his account information be stolen, this kind of thing
could easily happen. And it does.
That's why people like me keep harping on keeping your
computer secure, choosing good passwords, and all the other
habits we should develop to stay safe.
-----END PGP SIGNATURE-----
To post a comment on "Can hackers see data going to and from my computer?", please return
to that article's main page.
Question? Ask Leo!
The Tip Jar: Buy Leo a Latte!
By Date |
Business Card |
Advertisements do not imply my endorsement of any product or service.
Copyright © 2003-2013 Puget Sound Software, LLC and Leo A. Notenboom
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC
Terms, Conditions & Privacy
Product Reviews, Recommendations and Affiliate Links Disclosure