Question:

How can i find out that my computer is hacked???

by Guest64978  |  earlier

0 LIKES UnLike

Please tell me!

 Tags:

   Report

8 ANSWERS


  1. There is no way of getting your computer to say, yes you was hacked.

    What have you experienced then I can tell you what I think.


  2. You really need to specify.

    There is several things that can happen.

    1. Keylogger

    A keylogger is a file that is stored somewhere in your computer, it is mostly hidden well. What it does is copy all of your keystrokes to where the file is located. This will show them your user names, passwords, emails, financial information, and everything else that is typed. This can usually be found by your anti-virus.

    2. Any type of virus/trojan/worm

    All of these are not good news. They simply just help the "hacker" to make your life h**l. They can slow down your computer, steal information, make programs unresponsive, and even destroy your hard drive. These can also usually be found by any Anti-Virus software.

    2.Spyware

    These will annoy you until you start to cry. They are usually used for advertising. You will get a lot of pop ups. But even spyware can even be very dangerous.

    I simply just suggest downloading some Anti-Virus, and Anti-Spyware software. Run a scan with both programs. (Disabling your internet could be useful if the hacker was trying to access your machine) They will attempt to remove the malicious software. The next day, run a scan again with both softwares. If they are still found. I suggest either reformatting your computer, or take your computer to a computer repair shop and let them remove it for good.

    The best site for anti-spyware/virus is http://www.majorgeeks.com


  3. scan your computer and it will tell you or take it to a computer shop and they will find it and take it off for like $20

  4. go to download.com and make sure you download the FREE ones

    download spybot(i think thats what it is) it protects your pc from spyware

    download some antivirus protector-i dont have any in mind-

    and if your really paranoid

    set up a firewall

  5. look up online

  6. You can never know for sure unless you have a thousand dollar spyware system or you know how it works.

  7. If it's hacked then a program will allways be running in the background.

    Go, start, run and type in ' msconfig '. Go, to the startup tab. Disable everything thats in there.

    Then you are back in control.

  8. Most of the vulnerabilities of computers can be harnessed in several ways. Hacker Attacks can use a simple exploit specific or multiple exploits at the same time, a configuration deficient in one of the components of the system or even a backdoor installed in a previous attack.

    Because of this, detect hacker attacks is not an easy task, especially for an inexperienced user. This article gives a few ideas and basic guides to help you realize if your machine is under attack or if the security of your system is exposed to danger. Note that there is no 100% guarantee that you detect an attack hacker in this way. However, there are good chances that if your system has been penetrated, showing one or more of the following behaviors.

    Teams with Windows:

         * Traffic Network exit suspiciously high. If you are dialing into an account or using ADSL and note unusual high volume of traffic in the departure (especially if this trade happens when your computer is idle or not necessarily loading data) then it is possible that your computer is in danger . Your computer may be being used either to send spam or by a network worm that is playing and sending copies of itself. For cable connections, this is less relevant - is very common to have the same amount of traffic output as incoming network traffic, even if you're not doing nothing but visiting sites or downloading data from the Internet.

         * Great hard drive activity or suspicious-looking files in the root directory of any of the discs. After entering the system, many hackers have a massive scanning to find interesting documents or files containing passwords or details of bank accounts or payments such as PayPal. Likewise, some worms discovered on your disk files containing email addresses and use them to spread. If you notice a big activity on your hard when the system is inactive, files and folders names suspects in common, this may be an indication of penetration into the system or an infection of malware.

         * A large number of packages coming from one direction are simple and are blocked by a firewall (firewall). After locating a target (eg: the IP range of a company or group of users of cable services) hackers often use automated testing tools that try to use various exploits to break into the system. If you have a firewall (firewall) staff (an essential element to protect themselves from hacker attacks) and notice a unusually high number of packages that come from the same direction, then this is a clear indicator that your computer is under attack. The good news is that if your firewall (firewall) staff is reporting these attacks, it is very likely that you are safe. However, depending on the amount of services you exposed to the Internet, personal firewall may fail to protect against an attack directed at a specific FTP service system which has been open to all users. In this case, the solution is blocking the offending IP temporarily until the cease attempts to connect. Many firewall (firewall) s personal and IDS have a built-lock function.

         * A large number of packages coming from one direction and are blocked by your firewall (firewall). After locating a target (eg: the IP range of a company or group of users of cable services) hackers often use automated testing tools that try to use various exploits to break into the system. If you have a firewall (firewall) staff (an essential element to protect themselves from hacker attacks) and notice a unusually high number of packages that come from the same direction, then this is a clear indicator that your computer is under attack. The good news is that if your firewall (firewall) staff is reporting these attacks, it is very likely that you are safe. However, depending on the amount of services you exposed to the Internet, personal firewall may fail to protect against an attack directed at a specific FTP service system which has been open to all users. In this case, the solution is blocking the offending IP temporarily until the cease attempts to connect. Many firewall (firewall) s personal and IDS have a built-lock function. Your antivirus resident suddenly begins to report that he has found backdoors or Trojan horses, even if you have not done anything out of the ordinary. Although the hacker attacks can be complex and innovative, horses or backdoor Trojans acquaintances are still used to obtain full access to the system threatened. If the residents of your anti-virus component is detecting and reporting this type of malware, may indicate someone is trying to penetrate your system.

    Unix machines:

         * Files with names suspects in the file / tmp folder. Many exploits in the Unix world are based on the creation of temporary files in the folder / tmp, which are not always deleted after the hack the system. The same is true of some worms that infect Unix systems, they seized tmp directory and use it as their "home".

         * Often, after entering the system, the hacker tries to ensure access by installing a "backdoor" one of the demons with direct access from the Internet, or by modifying standard system utilities that are used to connect with others systems. The modified binaries are usually part of a rootkit and are generally invisible to an inspection simple. In all cases, it's a good idea to keep a database of the amounts of each utility control system checked regularly and disconnecting the network system and single-user mode.

         * The alteration / etc / passwd, / etc / shadow, or other files in the directory systems / etc. Sometimes hacker attacks may add a new user / etc / passwd you can get to remote entry system at a later date. Look for any user name suspect in the file of passwords and monitor all users aggregates, especially in a system of multiple users.

         * Services suspects added to / etc / services. To open a backdoor on a Unix system sometimes just add two lines of text. This is done to modify / etc / services and / etc / ined.conf. Monitor closely these two files and pay attention to any additions that could indicate a connection to a backdoor port suspect or unused.

Question Stats

Latest activity: earlier.
This question has 8 answers.

BECOME A GUIDE

Share your knowledge and help people by answering questions.