T
Tracker
For one, if your on a Windows Platform and you didn't disable a number
of services which are enabled by default, including file and print
sharing, the chances of your computer being hacked/owned are very high.
Also, if you haven’t secured your browser or e-mail programs this can
cause your computer to be hacked/owned. Not disabling these services
and not having a firewall or anti-virus program from the beginning of
your computer going on the internet, is a loss cause. Backdoors and
Trojan Horses disable your anti-virus and firewalls. So checking for
open ports no matter where you go or how you test your ports will not
give you accurate results. GRC shields-up has on one occasion showed my
computer as having port 110 open. The reason for this is because a
malicious hacker was using my e-mail application at the time my computer
was checked for open ports.
If your on a Windows Platform (minus XP and NT), select Start, Settings,
Control Panel, Folder Options, View and make sure you select and have a
dot in the circle where it says Show Hidden Files and Folders.
Select Start, Control Panel, Network, and if you see two AOL adapters,
two TCP/IP, two dial-up adapters, one or two Virtual Private Network
adapters your computer has what hackers install called a Virtual Private
Network, BEWARE!
If you find your system re-boots itself from time to time, this
is another sign that an Administrator (hacker) has to update your
hacked system.
Select Start, type regedit, select Registry, Export Registry, and in
the box type say 3-12-02.txt and say OK. Then open this file with
a text editor or word application and you might be "shocked" to find
what
really is installed on your system. Check the bottom of this file,
since
hackers love to install a bunch of their crap here.
What these hackers do is disable your anti-virus program using Trojan
Horses, which makes checking for viruses or trojans useless. If running
a software firewall, the hackers install another version of what your
running
and program it so you aren't able to see their activities.
Once these factors take into play, the best bet to keep the hackers
out of your system is to perform the below.
My suggestion would be to keep the hard drive (sent it to the FBI, minus
your
personal files). Or make a copy of your entire hard drive, this way if
the hackers have destroyed any system using your computer, at least you
have evidence if the FBI ever come knock on your door. The Trackers
would like a copy, but that's another story in itself.
You might want to format the hard drive, install from CD-ROM only and
obtain a free port scanner for your operating system. You can download
one from zdnet.com, and before you go online, port scan your own
computer to check for any open ports. Backdoors, Trojan Horses and
Viruses are not the consideration you need to be concerned with when
your system is hacked. Your system can also be running a Proxy Server,
NNTP Server, SMTP Server, Web Server, SQL Server and a Virtual Private
Network. All of these factors need to be taken into consideration.
Tracker
The Best Kept Secrets of Backdoors, Cracking, Firewalls, Hacking,
Proxies, The Internet, Trojan Horses, Virtual Private Networks, Virus,
Windows and different types of Servers can be found at:
http://geocities.com/secure2003222000
of services which are enabled by default, including file and print
sharing, the chances of your computer being hacked/owned are very high.
Also, if you haven’t secured your browser or e-mail programs this can
cause your computer to be hacked/owned. Not disabling these services
and not having a firewall or anti-virus program from the beginning of
your computer going on the internet, is a loss cause. Backdoors and
Trojan Horses disable your anti-virus and firewalls. So checking for
open ports no matter where you go or how you test your ports will not
give you accurate results. GRC shields-up has on one occasion showed my
computer as having port 110 open. The reason for this is because a
malicious hacker was using my e-mail application at the time my computer
was checked for open ports.
If your on a Windows Platform (minus XP and NT), select Start, Settings,
Control Panel, Folder Options, View and make sure you select and have a
dot in the circle where it says Show Hidden Files and Folders.
Select Start, Control Panel, Network, and if you see two AOL adapters,
two TCP/IP, two dial-up adapters, one or two Virtual Private Network
adapters your computer has what hackers install called a Virtual Private
Network, BEWARE!
If you find your system re-boots itself from time to time, this
is another sign that an Administrator (hacker) has to update your
hacked system.
Select Start, type regedit, select Registry, Export Registry, and in
the box type say 3-12-02.txt and say OK. Then open this file with
a text editor or word application and you might be "shocked" to find
what
really is installed on your system. Check the bottom of this file,
since
hackers love to install a bunch of their crap here.
What these hackers do is disable your anti-virus program using Trojan
Horses, which makes checking for viruses or trojans useless. If running
a software firewall, the hackers install another version of what your
running
and program it so you aren't able to see their activities.
Once these factors take into play, the best bet to keep the hackers
out of your system is to perform the below.
My suggestion would be to keep the hard drive (sent it to the FBI, minus
your
personal files). Or make a copy of your entire hard drive, this way if
the hackers have destroyed any system using your computer, at least you
have evidence if the FBI ever come knock on your door. The Trackers
would like a copy, but that's another story in itself.
You might want to format the hard drive, install from CD-ROM only and
obtain a free port scanner for your operating system. You can download
one from zdnet.com, and before you go online, port scan your own
computer to check for any open ports. Backdoors, Trojan Horses and
Viruses are not the consideration you need to be concerned with when
your system is hacked. Your system can also be running a Proxy Server,
NNTP Server, SMTP Server, Web Server, SQL Server and a Virtual Private
Network. All of these factors need to be taken into consideration.
Tracker
The Best Kept Secrets of Backdoors, Cracking, Firewalls, Hacking,
Proxies, The Internet, Trojan Horses, Virtual Private Networks, Virus,
Windows and different types of Servers can be found at:
http://geocities.com/secure2003222000