a hacker using remote access?

  • Thread starter Thread starter Ashley
  • Start date Start date
A

Ashley

I have tried using several anti-virus softwares, firewall
protection, etc, and this hacker keeps dodging everything
I throw at him. I'm at the end of my ropes. On the event
log it says that when I am on the computer it is being
accessed remotely. I have NOT authorized this, and no one
has touched my lap top since I purchased it and took it
out of the box new. What's happening? How can someone be
accessing my computer? Whoever it is has changed the
settings and I can no longer change the settings on my
own computer! They're in gray and no longer a changeable
option. They've installed a bunch of adapters and stuff
and I cannot get rid of them. I'd appreciate it if
someone could help me.
 
Hi,
this may happen,
Step1
get a norton antivirus, not firewall, update it, Download
Anti spyware softwares Ad-Aware and Spybot update them
too. Open your computer in safe mode and search if you
have any trojen as backdoor etc..
if you find something remove them.
Step 2
After than you should not use static ip when you are
connecting internet, if you are using dial-up change the
your telephone number. Some hacking softwares can find if
you have/use dsl or dial-up modem with the number you
have. ( simply using "ping") if you are using dsl modem,
the modem must have a internal firewall and you should
make some changes on the security. This way your
connection speed may me some more slower than usual.
Again do not use static ip for dsl.
Step3
For system protection have a new account and make it
limited. login as limited user to your pc and for
unlimited users make a long and difficult passwords for
each. Do not tell this passwords anyone else. For more
secure you can use firewall softwares.

** Step1
You may have trojen as a backdoor in your software. But i
think if this is a known one firewalls or antivirus
programs must report you, Also this can be written by the
hacker. if this is like just a spyware then no antivirus
can not notice. ( Norton 2005 solves this problems ) That
is why i adviced two antispyware programs.
** Step2
in any case All programs has security holes and firewalls
also including these. A smart person can find these holes
by testing, So using firewalls is not not enough to stop
hackers, Because they may know you are there ( on your
number or on the ip if you are using static ip/ also they
can find your ip from your telephone numbers dsl or dial-
up does not metter) and they can acsess your pc. So
getting difficult to remote acsess your computer, you may
have a new phone number if you are using dial-up. if you
are using dsl i have so suggestion changing your number,
it is up to you. But in any way; do not use static ip. As
i said if you have dsl and if the dsl has internal
firewall kindly ask someone to help you, i think you may
not know how to configure it. this is extra security.
** Step3
Mostly people are not choosing login to system as a
limited user. that means if any hacker acsess your system
while you are running pc, that means hacker can make
everything what you can do to on the system. So i think
you should thank God because of the hacker(s) did not
damage your system (You did not report anything like
this) if you login as a limited user then you can use pc
limited so if any hacker acsess your pc can not make
changes on your setting. ( At least with your system
settings ) if you have difficult password for unlimited
user accounts that makes difficult also for hacker to
acsess to whole your system. if you notice all the things
i told and after all and if you use a firewall software,
your system becomes like a prison. Also you can make a
virtual operating system by using a workstations. ( i am
using and if some one hacks my system that is just a fake
and nothing happens even they format my sistem. Because
they can not reach my real operating system. important
note you may not use system on notebook. Your hardware
probably is not enough to hold workstation. )
General Suggestions.
*Uptade your system ( do not install SP2 yet.) if you
using XP.
*Do not use P2P sharing softwares like imesh, kazaa in
this case you can open lots of ports with your own hands.
*Do not download or/and install softwares that you not
trust. Most of anti-spyware softwares have Backdoor
trojens. ( i have tested over 25 antispyware software and
found over 15 software have trojen)
*Do not let people you do not know/trust to include your
msn/yahoo mesenger account to their contact list if you
are using.
* Make a right click to your internet connection icon in
the Network Connection folder and tab to advanced check
the bar if not signed left side of the " protect my
computer as ...... " ( Sorry for my english ) You will
see a small lock at the rightup side of the icon.
if you need more help ( i do not think you will not need
after this answer ) contact with me.
Kind Regards
Ozkan Aybay
ABC Computing Technology
Technical Asistan
 
Hi,
i have one more advice to forget telling, if you can not
remove the hamfull things from your pc, back up just your
importana files, format whole your hdd, and install the
operating system again.
Ozkan Aybay
 
Ashley,
It seems that someone may well have remotely got in thru a backdoor Trojan.
These can hit thru a website or tainted email.
I would suggest removing the machine from the Internet, copying your
important files to another media i.e. floppies or CD's, and using the CD's
that came with the machine wiping it out and starting fresh. When you do so,
follow these steps
http://www.microsoft.com/athome/security/protect/default.aspx and surf
safely.

Ron Chamberlin
MS-MVP
 
Back
Top