Question:

How do people get inside your computer

by  |  earlier

0 LIKES UnLike

I dont want to know because I want to do it, but more or less for my own safety. I have wep encryption, firewalls in the router (i think) and windows. but I always hear as far as hacking goes " all you need is stime". The h**l does that mean? Do they have some peice of software th use to scan peoples computer? What other measure can I take to ecure my computer?

 Tags:

   Report

6 ANSWERS


  1. They build a secret cave and then they open your hardrive and lay their eggs inside


  2. WEP encryption is insecure. It can be broken within minutes.

    You want at least WPA or better WPA2.

  3. Let us say that your computer allows active X programs free rein on your computer. You go to a page that contains an active X component. It then does what it wants to your computer. To avoid this threat, one of many, in your browser, go to the Tools menu, and select Options (Internet Options if you still use Internet Explorer). Find the security area and disable automatic control granted to Active X.

  4. Computer systems are very complex and there might be some ways to trick the "ports" or pathways in-out your computer through to the internet.  If you fear hacking, encript your sensitive information or keep your sensitive info in a non-internet computer.

    Also if computer is idle, power it off or disconnect from internet to reduce hacking risk.

    It is said it is a matter of time because hackers will test all known ways to hack a common system and if not able to go through, they might try to do a "brute force attack" by login with a different password until they get it.

  5. A router with a built in firewall combined with a good software firewall like Comodo Pro will keep hackers out..

  6. Most people use software like IP scanners and port scanners and try and bypass people's firewalls  My opinion is keeping your IP address secure and avoid downloading stuff which sounds sinister because it often contains spyware like keyloggers and trojans which they can use to create a back door access to your computer, Steal your passwords and financial information or link your computer to a botnet and use it for DDOSing or advertising. You can use programs like TOR which stop people on websites seeing your IP.

Question Stats

Latest activity: earlier.
This question has 6 answers.

BECOME A GUIDE

Share your knowledge and help people by answering questions.