Am I being hacked?

  • Thread starter Thread starter Dustin
  • Start date Start date
D

Dustin

I get the following information in the event viewer
window under the system tab. It seems to correlate a bit
with portscan attempts, but actually the connection is
established every time I log on. Is this a hacker?

Event Type: Information
Event Source: RemoteAccess
Event Category: None
Event ID: 20158
Date: 8/13/2003
Time: 7:32:26 PM
User: N/A
Computer: CHIHUAHUA
Description:
The user (e-mail address removed) successfully established a
connection to MSN Explorer using the device COM3.

For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp.

Also, I recently recovered my system and applied the XP
patch. I checked for viruses and stuff before I ran the
full system recover (not restore). Is this enough to get
rid of viruses, or could there be some in the system
files?
 
Right click MY COMPUTER and goto Properties. From the
window that appears select REMOTE. If anything is
checked, UNCHECK IT!!
Also check your services and see what is running and
disable anything that may be running that is unnecesary.

Tony
 
Ok, I unchecked the box, but the remote user thing is
still appearing, and the security tab in the event viewer
is still registering quite a few changes. How can I keep
this hacker out of my system for good? The system
recover didn't work, and he's connecting to me through
MSN6.

I get the following information in the event viewer
window under the system tab. It seems to correlate a bit
with portscan attempts and attempted attacks, but the
connection is established every time I log on. Is this a
hacker?

Event Type: Information
Event Source: RemoteAccess
Event Category: None
Event ID: 20158
Date: 8/13/2003
Time: 7:32:26 PM
User: N/A
Computer: CHIHUAHUA
Description:
The user (e-mail address removed) successfully established a
connection to MSN Explorer using the device COM3.

For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp.

Also, I ran a full system recover (not restore). Is this
enough to keep out the files that the hacker may have
planted in my system, or could they still be interspersed
in the system files?
 
Back
Top