Am I being hacked?

D

Dustin

I get the following information in the event viewer
window under the system tab. It seems to correlate a bit
with portscan attempts, but actually the connection is
established every time I log on. Is this a hacker?

Event Type: Information
Event Source: RemoteAccess
Event Category: None
Event ID: 20158
Date: 8/13/2003
Time: 7:32:26 PM
User: N/A
Computer: CHIHUAHUA
Description:
The user (e-mail address removed) successfully established a
connection to MSN Explorer using the device COM3.

For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp.

Also, I recently recovered my system and applied the XP
patch. I checked for viruses and stuff before I ran the
full system recover (not restore). Is this enough to get
rid of viruses, or could there be some in the system
files?
 
T

toeknee

Right click MY COMPUTER and goto Properties. From the
window that appears select REMOTE. If anything is
checked, UNCHECK IT!!
Also check your services and see what is running and
disable anything that may be running that is unnecesary.

Tony
 
D

Dustin

Ok, I unchecked the box, but the remote user thing is
still appearing, and the security tab in the event viewer
is still registering quite a few changes. How can I keep
this hacker out of my system for good? The system
recover didn't work, and he's connecting to me through
MSN6.

I get the following information in the event viewer
window under the system tab. It seems to correlate a bit
with portscan attempts and attempted attacks, but the
connection is established every time I log on. Is this a
hacker?

Event Type: Information
Event Source: RemoteAccess
Event Category: None
Event ID: 20158
Date: 8/13/2003
Time: 7:32:26 PM
User: N/A
Computer: CHIHUAHUA
Description:
The user (e-mail address removed) successfully established a
connection to MSN Explorer using the device COM3.

For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp.

Also, I ran a full system recover (not restore). Is this
enough to keep out the files that the hacker may have
planted in my system, or could they still be interspersed
in the system files?
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top